<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 19:02:55 +0000</lastBuildDate>
    <item>
      <title>1f7b0a57-f874-4163-a32a-f3e81a08ad47</title>
      <link>https://db.gcve.eu/sighting/1f7b0a57-f874-4163-a32a-f3e81a08ad47/export</link>
      <description>{"uuid": "1f7b0a57-f874-4163-a32a-f3e81a08ad47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FQXH-VFV5-8QJP", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27501\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.\n\ud83d\udccf Published: 2025-03-03T18:33:19.670Z\n\ud83d\udccf Modified: 2025-03-03T19:10:02.275Z\n\ud83d\udd17 References:\n1. https://github.com/openziti/ziti-console/security/advisories/GHSA-fqxh-vfv5-8qjp", "creation_timestamp": "2025-03-03T19:31:05.000000Z"}</description>
      <content:encoded>{"uuid": "1f7b0a57-f874-4163-a32a-f3e81a08ad47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FQXH-VFV5-8QJP", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27501\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.\n\ud83d\udccf Published: 2025-03-03T18:33:19.670Z\n\ud83d\udccf Modified: 2025-03-03T19:10:02.275Z\n\ud83d\udd17 References:\n1. https://github.com/openziti/ziti-console/security/advisories/GHSA-fqxh-vfv5-8qjp", "creation_timestamp": "2025-03-03T19:31:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1f7b0a57-f874-4163-a32a-f3e81a08ad47/export</guid>
      <pubDate>Mon, 03 Mar 2025 19:31:05 +0000</pubDate>
    </item>
    <item>
      <title>2c9f5802-0522-405e-ad41-f9868b194d24</title>
      <link>https://db.gcve.eu/sighting/2c9f5802-0522-405e-ad41-f9868b194d24/export</link>
      <description>{"uuid": "2c9f5802-0522-405e-ad41-f9868b194d24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-fqxh-vfv5-8qjp", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114100218515671455", "content": "", "creation_timestamp": "2025-03-03T19:46:07.317781Z"}</description>
      <content:encoded>{"uuid": "2c9f5802-0522-405e-ad41-f9868b194d24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-fqxh-vfv5-8qjp", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114100218515671455", "content": "", "creation_timestamp": "2025-03-03T19:46:07.317781Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2c9f5802-0522-405e-ad41-f9868b194d24/export</guid>
      <pubDate>Mon, 03 Mar 2025 19:46:07 +0000</pubDate>
    </item>
  </channel>
</rss>
