<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 14 May 2026 19:57:01 +0000</lastBuildDate>
    <item>
      <title>48704f23-4f07-4c0c-b8ba-ae56a4185166</title>
      <link>https://db.gcve.eu/sighting/48704f23-4f07-4c0c-b8ba-ae56a4185166/export</link>
      <description>{"uuid": "48704f23-4f07-4c0c-b8ba-ae56a4185166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52880", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19400", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52880\n\ud83d\udd25 CVSS Score: 4.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: Komga is a media server for comics, mangas, BDs, magazines and eBooks. A Cross-Site Scripting (XSS) vulnerability has been discovered in versions 1.8.0 through 1.21.3 when serving EPUB resources, either directly from the API, or when reading using the epub reader. The vulnerability lets an attacker perform actions on the victim's behalf. When targeting an admin user, this can be combined with controlling a server-side command to achieve arbitrary code execution. For this vulnerability to be exploited, a malicious EPUB file has to be present in a Komga library, and subsequently accessed in the Epub reader by an admin user. Version 1.22.0 contains a patch for the issue.\n\ud83d\udccf Published: 2025-06-24T19:56:12.692Z\n\ud83d\udccf Modified: 2025-06-24T20:09:48.364Z\n\ud83d\udd17 References:\n1. https://github.com/gotson/komga/security/advisories/GHSA-m7mm-6jxp-2m4x\n2. https://github.com/gotson/komga/commit/5f9cc449b7846ed2066752c72c9ce7b20c3a85a7", "creation_timestamp": "2025-06-24T20:47:54.000000Z"}</description>
      <content:encoded>{"uuid": "48704f23-4f07-4c0c-b8ba-ae56a4185166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52880", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19400", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52880\n\ud83d\udd25 CVSS Score: 4.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: Komga is a media server for comics, mangas, BDs, magazines and eBooks. A Cross-Site Scripting (XSS) vulnerability has been discovered in versions 1.8.0 through 1.21.3 when serving EPUB resources, either directly from the API, or when reading using the epub reader. The vulnerability lets an attacker perform actions on the victim's behalf. When targeting an admin user, this can be combined with controlling a server-side command to achieve arbitrary code execution. For this vulnerability to be exploited, a malicious EPUB file has to be present in a Komga library, and subsequently accessed in the Epub reader by an admin user. Version 1.22.0 contains a patch for the issue.\n\ud83d\udccf Published: 2025-06-24T19:56:12.692Z\n\ud83d\udccf Modified: 2025-06-24T20:09:48.364Z\n\ud83d\udd17 References:\n1. https://github.com/gotson/komga/security/advisories/GHSA-m7mm-6jxp-2m4x\n2. https://github.com/gotson/komga/commit/5f9cc449b7846ed2066752c72c9ce7b20c3a85a7", "creation_timestamp": "2025-06-24T20:47:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/48704f23-4f07-4c0c-b8ba-ae56a4185166/export</guid>
      <pubDate>Tue, 24 Jun 2025 20:47:54 +0000</pubDate>
    </item>
    <item>
      <title>7b324b5b-4d81-45c3-9649-1b87580710cf</title>
      <link>https://db.gcve.eu/sighting/7b324b5b-4d81-45c3-9649-1b87580710cf/export</link>
      <description>{"uuid": "7b324b5b-4d81-45c3-9649-1b87580710cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52880", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsf4sdfiyv2s", "content": "", "creation_timestamp": "2025-06-24T22:17:11.807064Z"}</description>
      <content:encoded>{"uuid": "7b324b5b-4d81-45c3-9649-1b87580710cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52880", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsf4sdfiyv2s", "content": "", "creation_timestamp": "2025-06-24T22:17:11.807064Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7b324b5b-4d81-45c3-9649-1b87580710cf/export</guid>
      <pubDate>Tue, 24 Jun 2025 22:17:11 +0000</pubDate>
    </item>
  </channel>
</rss>
