<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 12:25:16 +0000</lastBuildDate>
    <item>
      <title>5c5f0d55-5544-49f7-a6cc-667884f6681d</title>
      <link>https://db.gcve.eu/sighting/5c5f0d55-5544-49f7-a6cc-667884f6681d/export</link>
      <description>{"uuid": "5c5f0d55-5544-49f7-a6cc-667884f6681d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh3xqa72pz2c", "content": "", "creation_timestamp": "2025-02-01T07:15:27.313083Z"}</description>
      <content:encoded>{"uuid": "5c5f0d55-5544-49f7-a6cc-667884f6681d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh3xqa72pz2c", "content": "", "creation_timestamp": "2025-02-01T07:15:27.313083Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5c5f0d55-5544-49f7-a6cc-667884f6681d/export</guid>
      <pubDate>Sat, 01 Feb 2025 07:15:27 +0000</pubDate>
    </item>
    <item>
      <title>04cb1eb0-d0f1-42f7-a13b-09132de3e152</title>
      <link>https://db.gcve.eu/sighting/04cb1eb0-d0f1-42f7-a13b-09132de3e152/export</link>
      <description>{"uuid": "04cb1eb0-d0f1-42f7-a13b-09132de3e152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3z4bdpmc2k", "content": "", "creation_timestamp": "2025-02-01T07:40:08.060891Z"}</description>
      <content:encoded>{"uuid": "04cb1eb0-d0f1-42f7-a13b-09132de3e152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3z4bdpmc2k", "content": "", "creation_timestamp": "2025-02-01T07:40:08.060891Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/04cb1eb0-d0f1-42f7-a13b-09132de3e152/export</guid>
      <pubDate>Sat, 01 Feb 2025 07:40:08 +0000</pubDate>
    </item>
    <item>
      <title>dbc15a67-f406-4feb-897e-0c56d72ac4da</title>
      <link>https://db.gcve.eu/sighting/dbc15a67-f406-4feb-897e-0c56d72ac4da/export</link>
      <description>{"uuid": "dbc15a67-f406-4feb-897e-0c56d72ac4da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3750", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0939\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-01T07:15:08.097\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/browser/magicform/trunk/admin/admin-menu.php\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/aa3497ae-7f3a-4e67-ad7a-77b50dccaf3b?source=cve", "creation_timestamp": "2025-02-01T09:26:09.000000Z"}</description>
      <content:encoded>{"uuid": "dbc15a67-f406-4feb-897e-0c56d72ac4da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3750", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0939\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-01T07:15:08.097\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/browser/magicform/trunk/admin/admin-menu.php\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/aa3497ae-7f3a-4e67-ad7a-77b50dccaf3b?source=cve", "creation_timestamp": "2025-02-01T09:26:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dbc15a67-f406-4feb-897e-0c56d72ac4da/export</guid>
      <pubDate>Sat, 01 Feb 2025 09:26:09 +0000</pubDate>
    </item>
    <item>
      <title>73f3d9ed-de6f-4369-88f0-3916405cf600</title>
      <link>https://db.gcve.eu/sighting/73f3d9ed-de6f-4369-88f0-3916405cf600/export</link>
      <description>{"uuid": "73f3d9ed-de6f-4369-88f0-3916405cf600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "https://t.me/cvedetector/17013", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0939 - WordPress MagicForm Plugin Unauthorized Data Access and Modification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0939 \nPublished : Feb. 1, 2025, 7:15 a.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : The MagicForm plugin for WordPress is vulnerable to access and modification of data due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those actions in order to delete or view logs, modify forms or modify plugin settings. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T09:47:58.000000Z"}</description>
      <content:encoded>{"uuid": "73f3d9ed-de6f-4369-88f0-3916405cf600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "https://t.me/cvedetector/17013", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0939 - WordPress MagicForm Plugin Unauthorized Data Access and Modification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0939 \nPublished : Feb. 1, 2025, 7:15 a.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : The MagicForm plugin for WordPress is vulnerable to access and modification of data due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those actions in order to delete or view logs, modify forms or modify plugin settings. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T09:47:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/73f3d9ed-de6f-4369-88f0-3916405cf600/export</guid>
      <pubDate>Sat, 01 Feb 2025 09:47:58 +0000</pubDate>
    </item>
    <item>
      <title>d44a245b-fbcc-44b5-af3f-f594529645a7</title>
      <link>https://db.gcve.eu/sighting/d44a245b-fbcc-44b5-af3f-f594529645a7/export</link>
      <description>{"uuid": "d44a245b-fbcc-44b5-af3f-f594529645a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3759", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0939\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: The MagicForm plugin for WordPress is vulnerable to access and modification of data due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those actions in order to delete or view logs, modify forms or modify plugin settings.\n\ud83d\udccf Published: 2025-02-01T09:30:28Z\n\ud83d\udccf Modified: 2025-02-01T09:30:28Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-0939\n2. https://plugins.trac.wordpress.org/browser/magicform/trunk/admin/admin-menu.php\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/aa3497ae-7f3a-4e67-ad7a-77b50dccaf3b?source=cve", "creation_timestamp": "2025-02-01T10:15:52.000000Z"}</description>
      <content:encoded>{"uuid": "d44a245b-fbcc-44b5-af3f-f594529645a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3759", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0939\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: The MagicForm plugin for WordPress is vulnerable to access and modification of data due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those actions in order to delete or view logs, modify forms or modify plugin settings.\n\ud83d\udccf Published: 2025-02-01T09:30:28Z\n\ud83d\udccf Modified: 2025-02-01T09:30:28Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-0939\n2. https://plugins.trac.wordpress.org/browser/magicform/trunk/admin/admin-menu.php\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/aa3497ae-7f3a-4e67-ad7a-77b50dccaf3b?source=cve", "creation_timestamp": "2025-02-01T10:15:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d44a245b-fbcc-44b5-af3f-f594529645a7/export</guid>
      <pubDate>Sat, 01 Feb 2025 10:15:52 +0000</pubDate>
    </item>
    <item>
      <title>f2a9c66f-f52c-4e5f-b57e-82f35bd42b16</title>
      <link>https://db.gcve.eu/sighting/f2a9c66f-f52c-4e5f-b57e-82f35bd42b16/export</link>
      <description>{"uuid": "f2a9c66f-f52c-4e5f-b57e-82f35bd42b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "Telegram/yIpN6PqpaBUz5d7uUr_IWcWz_OR0h7oJyKsHPg-R4wZRBNwo", "content": "", "creation_timestamp": "2025-02-21T22:10:24.000000Z"}</description>
      <content:encoded>{"uuid": "f2a9c66f-f52c-4e5f-b57e-82f35bd42b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0939", "type": "seen", "source": "Telegram/yIpN6PqpaBUz5d7uUr_IWcWz_OR0h7oJyKsHPg-R4wZRBNwo", "content": "", "creation_timestamp": "2025-02-21T22:10:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f2a9c66f-f52c-4e5f-b57e-82f35bd42b16/export</guid>
      <pubDate>Fri, 21 Feb 2025 22:10:24 +0000</pubDate>
    </item>
  </channel>
</rss>
