{"vulnerability": "CVE-2025-1440", "sightings": [{"uuid": "907213bf-944b-480f-9a7c-128c849752fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14405", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1093/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "20ccb1ff-6b96-4f71-81ce-894cbb67f933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14404", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1092/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "8bfaf7c4-be4a-4a97-bebf-930488090e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14403", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1091/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "0a85bf35-751a-4b4a-9955-22e03db1536a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14402", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1090/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "c5d4b008-4101-44bc-adda-a84ca51120d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14401", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1089/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "15490f10-92d8-4a93-91a0-3bd4ab85e134", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14409", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1082/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "9179d4cb-3995-4337-97e7-05cf78e31378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14408", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1081/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "9b54c3ac-f080-4d27-9f51-acce7f525229", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14407", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1080/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "9ecee993-b6f7-41dd-93eb-3f0d0c444670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14406", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1079/", "content": "", "creation_timestamp": "2025-12-11T05:00:00.000000Z"}, {"uuid": "8ae98963-6573-4714-a278-3c2b7008e86b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1440", "type": "seen", "source": "https://t.me/cvedetector/21155", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1440 - WordPress Advanced iFrame Plugin Unauthenticated Option Excessive Creation\", \n  \"Content\": \"CVE ID : CVE-2025-1440 \nPublished : March 26, 2025, 10:15 a.m. | 17\u00a0minutes ago \nDescription : The Advanced iFrame plugin for WordPress is vulnerable to unauthorized excessive creation of options on the aip_map_url_callback() function in all versions up to, and including, 2024.5 due to insufficient restrictions. This makes it possible for unauthenticated attackers to update the advancediFrameParameterData option with an excessive amount of unvalidated data. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T12:12:41.000000Z"}, {"uuid": "70b9c3af-d15f-4df3-94ff-b36f0b0d2338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14400", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1061/", "content": "", "creation_timestamp": "2025-12-10T05:00:00.000000Z"}, {"uuid": "fe0fc83d-8fb0-4203-8b9c-7d6cbbe9efa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1440", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8820", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1440\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The Advanced iFrame plugin for WordPress is vulnerable to unauthorized excessive creation of options on the aip_map_url_callback() function in all versions up to, and including, 2024.5 due to insufficient restrictions. This makes it possible for unauthenticated attackers to update the advancediFrameParameterData option with an excessive amount of unvalidated data.\n\ud83d\udccf Published: 2025-03-26T09:21:51.286Z\n\ud83d\udccf Modified: 2025-03-26T09:21:51.286Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/b92913fa-aa1e-40a0-9a48-d730b2102217?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3255604%40advanced-iframe&amp;new=3255604%40advanced-iframe&amp;sfp_email=&amp;sfph_mail=#file1", "creation_timestamp": "2025-03-26T10:25:17.000000Z"}]}