{"vulnerability": "CVE-2025-22239", "sightings": [{"uuid": "fcf87c54-3e30-415f-bb4c-f3a31e5fc398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrid54hemi2e", "content": "", "creation_timestamp": "2025-06-13T11:23:23.716714Z"}, {"uuid": "948467f7-fef0-4174-81ee-5309640108cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "Telegram/sBDh5C1zdFlaWSlBVyrMdS-46U_0ME-q4bAhLyd2EZru7fQ", "content": "", "creation_timestamp": "2025-06-13T07:34:25.000000Z"}, {"uuid": "d0b946b0-29d8-4c87-b3a2-e1181990f969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "Telegram/YAQ_JQCmsPiXmqZ7phOl7Olo1teqLC4-3XH11jchkPqYPeM", "content": "", "creation_timestamp": "2025-06-13T09:22:49.000000Z"}, {"uuid": "6201458f-4880-46d3-85f3-cd116b7bfba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lrhvusbskwj2", "content": "", "creation_timestamp": "2025-06-13T07:28:23.500726Z"}, {"uuid": "48addf3a-65ba-484e-98e8-967599f867a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22239", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18274", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22239\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L)\n\ud83d\udd39 Description: Arbitrary event injection on Salt Master. The master's \"_minion_event\" method can be used by and authorized minion to send arbitrary events onto the master's event bus.\n\ud83d\udccf Published: 2025-06-13T07:00:53.681Z\n\ud83d\udccf Modified: 2025-06-13T07:00:53.681Z\n\ud83d\udd17 References:\n1. https://docs.saltproject.io/en/3006/topics/releases/3006.12.html\n2. https://docs.saltproject.io/en/3007/topics/releases/3007.4.html", "creation_timestamp": "2025-06-13T07:33:13.000000Z"}]}