{"vulnerability": "CVE-2025-1504", "sightings": [{"uuid": "8aeba4b7-3052-4d56-a520-37711af607af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15044", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115770816689961344", "content": "", "creation_timestamp": "2025-12-23T20:41:12.119940Z"}, {"uuid": "d321ca63-ef53-49c5-8bf5-44428ac4f6cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15045", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115770935074137474", "content": "", "creation_timestamp": "2025-12-23T21:11:18.457274Z"}, {"uuid": "9f2866e4-56e0-4500-939e-34e97daff4cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15046", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115771052173425085", "content": "", "creation_timestamp": "2025-12-23T21:41:05.239905Z"}, {"uuid": "32416238-0c38-463c-8a91-c9e363800465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15044", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3maoqszocp32o", "content": "", "creation_timestamp": "2025-12-23T22:02:10.737339Z"}, {"uuid": "749453c2-8cd1-4bb2-9de4-12ad09f166d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15047", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115771230864366071", "content": "", "creation_timestamp": "2025-12-23T22:26:31.945456Z"}, {"uuid": "e6d00afc-ab32-4c7d-b47f-aea37e17c102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15047", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115771323829528233", "content": "", "creation_timestamp": "2025-12-23T22:50:10.184946Z"}, {"uuid": "a03504cc-cbe1-4803-9639-5217a0c81f9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15048", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115771364289910889", "content": "", "creation_timestamp": "2025-12-23T23:00:27.837278Z"}, {"uuid": "b6387799-6bec-429c-a797-ed6615043dd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15045", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3map2v5w6s62c", "content": "", "creation_timestamp": "2025-12-24T01:02:19.702608Z"}, {"uuid": "a17cf3a0-bc34-479a-ba7e-ea7e1b175c3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15046", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3map4xnmp652e", "content": "", "creation_timestamp": "2025-12-24T01:39:30.547610Z"}, {"uuid": "418385fa-d51b-469b-830e-2386a431fa14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15047", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3map5am5uxf2q", "content": "", "creation_timestamp": "2025-12-24T01:44:31.036514Z"}, {"uuid": "640ac454-d361-477d-93cc-13ce75940e41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15049", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3map6lnh22k2e", "content": "", "creation_timestamp": "2025-12-24T02:08:35.265831Z"}, {"uuid": "b7fd161c-2f6a-4cb9-9909-0cc0eadac3ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15048", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3map75kce6g2x", "content": "", "creation_timestamp": "2025-12-24T02:18:36.009887Z"}, {"uuid": "221aa923-de45-4f87-8a97-758602428397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-15047", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115773271966921529", "content": "", "creation_timestamp": "2025-12-24T07:05:37.844584Z"}, {"uuid": "c1a20972-63f3-4315-b09b-df14a8874842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-15047", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mapp6splbb2m", "content": "", "creation_timestamp": "2025-12-24T07:05:39.473401Z"}, {"uuid": "2d3f78b3-31ea-4102-b3c7-fa91d4ae779c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15047", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115774014980323034", "content": "", "creation_timestamp": "2025-12-24T10:14:33.923365Z"}, {"uuid": "23bbb519-fc12-46fb-b013-12a250c34e7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15048", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115786407269727739", "content": "", "creation_timestamp": "2025-12-26T14:46:05.454369Z"}, {"uuid": "954d6d8b-53a0-45ad-8eb9-4273f0fd696e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15043", "type": "seen", "source": "https://gist.github.com/Darkcrai86/911ccd3615c5e2b3235e7f672ca36c3c", "content": "", "creation_timestamp": "2026-01-20T15:51:06.000000Z"}, {"uuid": "f74472f6-15d4-4f4e-a279-cd7da14498fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15043", "type": "seen", "source": "https://gist.github.com/Darkcrai86/86b2b446f13bce5f1c855a09037fcf3f", "content": "", "creation_timestamp": "2026-01-20T16:19:32.000000Z"}, {"uuid": "a031542f-ae48-489b-992e-0622a85d04f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15043", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mcumippakz2i", "content": "", "creation_timestamp": "2026-01-20T16:51:11.261493Z"}, {"uuid": "1162db18-dadc-4aac-97b7-26267e38fece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "cve-2025-15041", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mfbispbwl22m", "content": "", "creation_timestamp": "2026-02-20T06:40:11.316317Z"}, {"uuid": "7fa2dde5-96be-480a-9045-361635101be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1504", "type": "seen", "source": "https://t.me/cvedetector/19876", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1504 - WordPress Post Lockdown Plugin Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1504 \nPublished : March 8, 2025, 3:15 a.m. | 2\u00a0hours, 19\u00a0minutes ago \nDescription : The Post Lockdown plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.0.2 via the 'pl_autocomplete' AJAX action due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract data from password protected, private, or draft posts that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-08T06:49:35.000000Z"}, {"uuid": "4ea0340d-d8ad-4a85-9a58-8144899a328d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1504", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6914", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1504\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: The Post Lockdown plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.0.2 via the 'pl_autocomplete' AJAX action due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.\n\ud83d\udccf Published: 2025-03-08T02:24:03.840Z\n\ud83d\udccf Modified: 2025-03-08T02:24:03.840Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/447cef6f-fa2e-4087-946d-6e0214830ea9?source=cve\n2. https://wordpress.org/plugins/post-lockdown/", "creation_timestamp": "2025-03-08T02:35:25.000000Z"}]}