{"vulnerability": "CVE-2025-1556", "sightings": [{"uuid": "049f1a69-3e32-4b78-9438-0b740b545a2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1556", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liroglagbe2f", "content": "", "creation_timestamp": "2025-02-22T15:52:46.122739Z"}, {"uuid": "d8a4601e-3b2c-4552-862f-15ec7f73c14a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15566", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3me64lfqnlr2h", "content": "", "creation_timestamp": "2026-02-06T04:58:11.269066Z"}, {"uuid": "5fe3a36d-34c5-493e-9d89-94c45a41d994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-15568", "type": "seen", "source": "https://bsky.app/profile/secqube.com/post/3mhchfo4wgj2t", "content": "", "creation_timestamp": "2026-03-18T02:38:03.280289Z"}, {"uuid": "bd33f057-f0dc-436d-8ac9-7825e4aa4470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15566", "type": "seen", "source": "https://bsky.app/profile/chrisshort.net/post/3me73ech2a32i", "content": "", "creation_timestamp": "2026-02-06T14:08:58.909822Z"}, {"uuid": "3ac57416-3f46-4f06-a32b-296f4babdac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15566", "type": "seen", "source": "https://bsky.app/profile/kubernetes.io/post/3me7bvnm7zl27", "content": "", "creation_timestamp": "2026-02-06T16:06:03.906087Z"}, {"uuid": "d0216a26-aa2c-474e-abca-3ef5f75a50ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1556", "type": "seen", "source": "https://t.me/cvedetector/18717", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1556 - Westboy CicadasCMS Deserialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1556 \nPublished : Feb. 22, 2025, 1:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in westboy CicadasCMS 1.0. This issue affects some unknown processing of the file /system of the component Template Management. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T16:39:48.000000Z"}, {"uuid": "49419486-64e7-4824-b258-1d2083227243", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15566", "type": "seen", "source": "https://bsky.app/profile/kubernetes.dev/post/3me72n6p2qy2o", "content": "", "creation_timestamp": "2026-02-06T13:56:03.854144Z"}, {"uuid": "de30cf48-2715-404f-a619-f309ebcc5bd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15566", "type": "seen", "source": "https://hachyderm.io/users/ChrisShort/statuses/116024078259034187", "content": "", "creation_timestamp": "2026-02-06T14:08:57.695304Z"}, {"uuid": "7a88bf0e-a9ee-477e-85f7-a2ffd61ef5c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-15567", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mftgdpg4ra2y", "content": "", "creation_timestamp": "2026-02-27T09:43:55.978918Z"}, {"uuid": "3e739aac-5dcf-4c55-a1b7-91ec7dccd060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15568", "type": "seen", "source": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-15568", "content": "", "creation_timestamp": "2026-03-09T16:16:10.000000Z"}, {"uuid": "5d0637c4-5768-4dc3-b0b7-124e4fd2375d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1556", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5026", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1556\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as problematic, has been found in westboy CicadasCMS 1.0. This issue affects some unknown processing of the file /system of the component Template Management. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-02-22T12:31:04.247Z\n\ud83d\udccf Modified: 2025-02-22T12:31:04.247Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.296507\n2. https://vuldb.com/?ctiid.296507\n3. https://vuldb.com/?submit.499520\n4. https://github.com/FightingLzn9/vul/blob/main/CicadasCMS(2).md", "creation_timestamp": "2025-02-22T13:22:48.000000Z"}]}