{"vulnerability": "CVE-2025-21616", "sightings": [{"uuid": "77ff0fdf-7605-46f0-97af-86f539f978ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21616", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113783537498716667", "content": "", "creation_timestamp": "2025-01-06T21:29:57.926537Z"}, {"uuid": "8c728923-9d04-4c5c-b655-02e7b2675f38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21616", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/236", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21616\n\ud83d\udd39 Description: Plane is an open-source project management tool. A cross-site scripting (XSS) vulnerability has been identified in Plane versions prior to 0.23. The vulnerability allows authenticated users to upload SVG files containing malicious JavaScript code as profile images, which gets executed in victims' browsers when viewing the profile image.\n\ud83d\udccf Published: 2025-01-06T21:22:24.129Z\n\ud83d\udccf Modified: 2025-01-06T21:22:24.129Z\n\ud83d\udd17 References:\n1. https://github.com/makeplane/plane/security/advisories/GHSA-rcg8-g69v-x23j", "creation_timestamp": "2025-01-06T21:36:04.000000Z"}, {"uuid": "2def68e1-15ff-4005-82da-0e6236c79a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21616", "type": "seen", "source": "https://t.me/cvedetector/14409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21616 - Plane XSS Image Profile Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21616 \nPublished : Jan. 6, 2025, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Plane is an open-source project management tool. A cross-site scripting (XSS) vulnerability has been identified in Plane versions prior to 0.23. The vulnerability allows authenticated users to upload SVG files containing malicious JavaScript code as profile images, which gets executed in victims' browsers when viewing the profile image. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T00:28:22.000000Z"}, {"uuid": "c0250de6-f9a1-4770-9a8d-83b45ae3fce5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21616", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/10097", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21616\n\ud83d\udd39 Description: Plane is an open-source project management tool. A cross-site scripting (XSS) vulnerability has been identified in Plane versions prior to 0.23. The vulnerability allows authenticated users to upload SVG files containing malicious JavaScript code as profile images, which gets executed in victims' browsers when viewing the profile image.\n\ud83d\udccf Published: 2025-01-06T21:22:24.129Z\n\ud83d\udccf Modified: 2025-01-06T21:22:24.129Z\n\ud83d\udd17 References:\n1. https://github.com/makeplane/plane/security/advisories/GHSA-rcg8-g69v-x23j", "creation_timestamp": "2025-01-06T22:36:29.000000Z"}]}