<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 12:07:04 +0000</lastBuildDate>
    <item>
      <title>8afaabb8-fc1d-489a-9d2d-9d231ac045a3</title>
      <link>https://db.gcve.eu/sighting/8afaabb8-fc1d-489a-9d2d-9d231ac045a3/export</link>
      <description>{"uuid": "8afaabb8-fc1d-489a-9d2d-9d231ac045a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26573", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8873", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26573\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Rizzi Guestbook allows Reflected XSS. This issue affects Rizzi Guestbook: from n/a through 4.0.1.\n\ud83d\udccf Published: 2025-03-26T14:24:19.969Z\n\ud83d\udccf Modified: 2025-03-26T15:08:59.964Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/rizzi-guestbook/vulnerability/wordpress-rizzi-guestbook-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:22.000000Z"}</description>
      <content:encoded>{"uuid": "8afaabb8-fc1d-489a-9d2d-9d231ac045a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26573", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8873", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26573\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Rizzi Guestbook allows Reflected XSS. This issue affects Rizzi Guestbook: from n/a through 4.0.1.\n\ud83d\udccf Published: 2025-03-26T14:24:19.969Z\n\ud83d\udccf Modified: 2025-03-26T15:08:59.964Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/rizzi-guestbook/vulnerability/wordpress-rizzi-guestbook-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8afaabb8-fc1d-489a-9d2d-9d231ac045a3/export</guid>
      <pubDate>Wed, 26 Mar 2025 15:26:22 +0000</pubDate>
    </item>
    <item>
      <title>e4a9b03f-aaf5-4195-ad7a-e895f53afdeb</title>
      <link>https://db.gcve.eu/sighting/e4a9b03f-aaf5-4195-ad7a-e895f53afdeb/export</link>
      <description>{"uuid": "e4a9b03f-aaf5-4195-ad7a-e895f53afdeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26575", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8874", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26575\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Maurer Display Post Meta allows Reflected XSS. This issue affects Display Post Meta: from n/a through 2.4.4.\n\ud83d\udccf Published: 2025-03-26T14:24:20.161Z\n\ud83d\udccf Modified: 2025-03-26T15:08:36.868Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/display-post-meta/vulnerability/wordpress-display-post-meta-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:23.000000Z"}</description>
      <content:encoded>{"uuid": "e4a9b03f-aaf5-4195-ad7a-e895f53afdeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26575", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8874", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26575\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Maurer Display Post Meta allows Reflected XSS. This issue affects Display Post Meta: from n/a through 2.4.4.\n\ud83d\udccf Published: 2025-03-26T14:24:20.161Z\n\ud83d\udccf Modified: 2025-03-26T15:08:36.868Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/display-post-meta/vulnerability/wordpress-display-post-meta-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e4a9b03f-aaf5-4195-ad7a-e895f53afdeb/export</guid>
      <pubDate>Wed, 26 Mar 2025 15:26:23 +0000</pubDate>
    </item>
    <item>
      <title>f5f8a7b9-2312-410d-95fe-535d4711af83</title>
      <link>https://db.gcve.eu/sighting/f5f8a7b9-2312-410d-95fe-535d4711af83/export</link>
      <description>{"uuid": "f5f8a7b9-2312-410d-95fe-535d4711af83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26576", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8875", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26576\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in takumin WP Simple Slideshow allows Reflected XSS. This issue affects WP Simple Slideshow: from n/a through 1.0.\n\ud83d\udccf Published: 2025-03-26T14:24:20.326Z\n\ud83d\udccf Modified: 2025-03-26T15:08:15.469Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-simple-slideshow/vulnerability/wordpress-wp-simple-slideshow-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:25.000000Z"}</description>
      <content:encoded>{"uuid": "f5f8a7b9-2312-410d-95fe-535d4711af83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26576", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8875", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26576\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in takumin WP Simple Slideshow allows Reflected XSS. This issue affects WP Simple Slideshow: from n/a through 1.0.\n\ud83d\udccf Published: 2025-03-26T14:24:20.326Z\n\ud83d\udccf Modified: 2025-03-26T15:08:15.469Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-simple-slideshow/vulnerability/wordpress-wp-simple-slideshow-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f5f8a7b9-2312-410d-95fe-535d4711af83/export</guid>
      <pubDate>Wed, 26 Mar 2025 15:26:25 +0000</pubDate>
    </item>
    <item>
      <title>5171e928-8e3e-48ab-a83e-086a8ab6a1f1</title>
      <link>https://db.gcve.eu/sighting/5171e928-8e3e-48ab-a83e-086a8ab6a1f1/export</link>
      <description>{"uuid": "5171e928-8e3e-48ab-a83e-086a8ab6a1f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26579", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8877", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26579\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in videowhisper MicroPayments allows Reflected XSS. This issue affects MicroPayments: from n/a through 3.1.6.\n\ud83d\udccf Published: 2025-03-26T14:24:20.486Z\n\ud83d\udccf Modified: 2025-03-26T15:07:23.747Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/paid-membership/vulnerability/wordpress-micropayments-paid-membership-plugin-1-2-reflected-cross-site-scripting-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:27.000000Z"}</description>
      <content:encoded>{"uuid": "5171e928-8e3e-48ab-a83e-086a8ab6a1f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26579", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8877", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26579\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in videowhisper MicroPayments allows Reflected XSS. This issue affects MicroPayments: from n/a through 3.1.6.\n\ud83d\udccf Published: 2025-03-26T14:24:20.486Z\n\ud83d\udccf Modified: 2025-03-26T15:07:23.747Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/paid-membership/vulnerability/wordpress-micropayments-paid-membership-plugin-1-2-reflected-cross-site-scripting-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5171e928-8e3e-48ab-a83e-086a8ab6a1f1/export</guid>
      <pubDate>Wed, 26 Mar 2025 15:26:27 +0000</pubDate>
    </item>
    <item>
      <title>e08e1684-e172-4abd-89a6-3418858dde87</title>
      <link>https://db.gcve.eu/sighting/e08e1684-e172-4abd-89a6-3418858dde87/export</link>
      <description>{"uuid": "e08e1684-e172-4abd-89a6-3418858dde87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26574", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "e08e1684-e172-4abd-89a6-3418858dde87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26574", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e08e1684-e172-4abd-89a6-3418858dde87/export</guid>
      <pubDate>Tue, 26 Aug 2025 13:26:34 +0000</pubDate>
    </item>
    <item>
      <title>5db7d518-151a-4e58-9df1-10e38ae0f587</title>
      <link>https://db.gcve.eu/sighting/5db7d518-151a-4e58-9df1-10e38ae0f587/export</link>
      <description>{"uuid": "5db7d518-151a-4e58-9df1-10e38ae0f587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26572", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "5db7d518-151a-4e58-9df1-10e38ae0f587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26572", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5db7d518-151a-4e58-9df1-10e38ae0f587/export</guid>
      <pubDate>Tue, 26 Aug 2025 13:26:34 +0000</pubDate>
    </item>
    <item>
      <title>cfc87641-bd2e-43d8-abdb-148d768713de</title>
      <link>https://db.gcve.eu/sighting/cfc87641-bd2e-43d8-abdb-148d768713de/export</link>
      <description>{"uuid": "cfc87641-bd2e-43d8-abdb-148d768713de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26577", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "cfc87641-bd2e-43d8-abdb-148d768713de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26577", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cfc87641-bd2e-43d8-abdb-148d768713de/export</guid>
      <pubDate>Tue, 26 Aug 2025 13:26:34 +0000</pubDate>
    </item>
    <item>
      <title>20e657a3-de96-4632-aa62-9c0f7c09696e</title>
      <link>https://db.gcve.eu/sighting/20e657a3-de96-4632-aa62-9c0f7c09696e/export</link>
      <description>{"uuid": "20e657a3-de96-4632-aa62-9c0f7c09696e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26571", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "20e657a3-de96-4632-aa62-9c0f7c09696e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26571", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/20e657a3-de96-4632-aa62-9c0f7c09696e/export</guid>
      <pubDate>Tue, 26 Aug 2025 13:26:34 +0000</pubDate>
    </item>
    <item>
      <title>9383d409-9c6e-49ff-8d0b-026c059a2f11</title>
      <link>https://db.gcve.eu/sighting/9383d409-9c6e-49ff-8d0b-026c059a2f11/export</link>
      <description>{"uuid": "9383d409-9c6e-49ff-8d0b-026c059a2f11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26570", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "9383d409-9c6e-49ff-8d0b-026c059a2f11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26570", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9383d409-9c6e-49ff-8d0b-026c059a2f11/export</guid>
      <pubDate>Tue, 26 Aug 2025 13:26:34 +0000</pubDate>
    </item>
    <item>
      <title>5a1ba689-0c43-46f2-a0aa-2026b380409d</title>
      <link>https://db.gcve.eu/sighting/5a1ba689-0c43-46f2-a0aa-2026b380409d/export</link>
      <description>{"uuid": "5a1ba689-0c43-46f2-a0aa-2026b380409d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26578", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "5a1ba689-0c43-46f2-a0aa-2026b380409d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26578", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5a1ba689-0c43-46f2-a0aa-2026b380409d/export</guid>
      <pubDate>Tue, 26 Aug 2025 13:26:34 +0000</pubDate>
    </item>
  </channel>
</rss>
