{"vulnerability": "CVE-2025-2251", "sightings": [{"uuid": "d917418e-4013-487a-b61d-713e720930f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22519", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113788094776523915", "content": "", "creation_timestamp": "2025-01-07T16:48:56.792977Z"}, {"uuid": "3bff79ff-a880-4b7b-b6a1-b7944957dad5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22510", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfd3brusew2f", "content": "", "creation_timestamp": "2025-01-09T16:17:12.267421Z"}, {"uuid": "0e912352-61f8-4d97-b2b1-4126b82f8338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22511", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62elv7p62f", "content": "", "creation_timestamp": "2025-01-07T16:17:34.127011Z"}, {"uuid": "07e9e869-f2da-4745-9e57-fc2addf376ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22515", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62eqvaks2c", "content": "", "creation_timestamp": "2025-01-07T16:17:39.360443Z"}, {"uuid": "30edbe46-30db-4b35-9dfc-407ba98a76ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22516", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62etmgy325", "content": "", "creation_timestamp": "2025-01-07T16:17:42.238158Z"}, {"uuid": "110996a1-bef8-4251-9c29-e6620ccf6102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22517", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62evztzd2k", "content": "", "creation_timestamp": "2025-01-07T16:17:44.859380Z"}, {"uuid": "c468cb25-e5cb-41b4-bf41-7051a76bd717", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22510", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llmqin4dcs2e", "content": "", "creation_timestamp": "2025-03-30T21:02:01.217145Z"}, {"uuid": "194b2bba-0a62-4e88-a76f-090fa0a42d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22513", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113900710133325976", "content": "", "creation_timestamp": "2025-01-27T14:08:30.549174Z"}, {"uuid": "1e65971d-633f-4bad-accb-e7471fd8b40f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22513", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgq4vrmppu2w", "content": "", "creation_timestamp": "2025-01-27T14:16:05.145034Z"}, {"uuid": "3491e022-9d3a-45de-a2ea-982d71e97080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2251", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:40.000000Z"}, {"uuid": "197c5ba5-78db-444d-9508-bb7ce7f84384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2251", "type": "seen", "source": "https://t.me/cvedetector/22306", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2251 - WildFly/JBoss EAP EJB Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2251 \nPublished : April 7, 2025, 2:15 p.m. | 23\u00a0minutes ago \nDescription : A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T17:04:09.000000Z"}, {"uuid": "e2a605e1-be9b-4279-8449-d715079078fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22512", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62eogja622", "content": "", "creation_timestamp": "2025-01-07T16:17:37.055542Z"}, {"uuid": "5a145a5c-550d-415d-9b30-4dcc8a9800d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22514", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmweb43ow2c", "content": "", "creation_timestamp": "2025-01-13T14:15:43.948321Z"}, {"uuid": "a2129f2a-4064-4c9a-84a1-996fddc4934c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22514", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfn37vd4my2e", "content": "", "creation_timestamp": "2025-01-13T15:42:47.666199Z"}, {"uuid": "84c3cb85-d077-423d-83eb-f0051c64687f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2251", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "ecfe3c33-a7da-4e5c-a017-e116af3ed453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2251", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13215", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2251\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H)\n\ud83d\udd39 Description: A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication.\n\ud83d\udccf Published: 2025-04-07T14:06:46.985Z\n\ud83d\udccf Modified: 2025-04-24T11:00:53.903Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-2251\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2351678", "creation_timestamp": "2025-04-24T11:06:44.000000Z"}, {"uuid": "9127d7a5-dbc1-44b4-85b5-eb2c3b699ace", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22510", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9755", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC of CVE-2025-22510\nURL\uff1ahttps://github.com/DoTTak/CVE-2025-22510\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-01-08T01:20:53.000000Z"}, {"uuid": "6ddddfbb-aa04-4567-95bf-cb7212d4f696", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22514", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1361", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22514\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yamna Tatheer KNR Author List Widget allows Reflected XSS.This issue affects KNR Author List Widget: from n/a through 3.1.1.\n\ud83d\udccf Published: 2025-01-13T13:11:32.769Z\n\ud83d\udccf Modified: 2025-01-13T13:48:18.916Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/knr-author-list-widget/vulnerability/wordpress-axact-author-list-widget-plugin-3-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-13T14:12:57.000000Z"}, {"uuid": "3dddbfac-b54f-4366-8640-b70659b6fac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22513", "type": "seen", "source": "https://t.me/cvedetector/16456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22513 - Apache ASP.NET NotFound Simple Locator Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22513 \nPublished : Jan. 27, 2025, 2:15 p.m. | 15\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Simple Locator allows Reflected XSS. This issue affects Simple Locator: from n/a through 2.0.4. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T15:59:45.000000Z"}, {"uuid": "425e21e5-0c87-46c1-a17a-9193d7f7f129", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22514", "type": "seen", "source": "https://t.me/cvedetector/15142", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22514 - \"Yamna Tatheer KNR Author List Widget Cross-site Scripting\"\", \n  \"Content\": \"CVE ID : CVE-2025-22514 \nPublished : Jan. 13, 2025, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yamna Tatheer KNR Author List Widget allows Reflected XSS.This issue affects KNR Author List Widget: from n/a through 3.1.1. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T16:14:14.000000Z"}, {"uuid": "96edf2dd-83ad-4fac-9d74-117cb6932e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22518", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62eyqjro22", "content": "", "creation_timestamp": "2025-01-07T16:17:47.967356Z"}, {"uuid": "43dbe792-167c-4b5d-9a68-664abb436bce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22519", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62f3exxg2f", "content": "", "creation_timestamp": "2025-01-07T16:17:50.349171Z"}, {"uuid": "82154d6e-78d8-467e-b27f-0b4cbd81ad16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22518", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/460", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22518\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in KentoThemes Justified Image Gallery allows Stored XSS.This issue affects Justified Image Gallery: from n/a through 1.0.\n\ud83d\udccf Published: 2025-01-07T14:57:34.012Z\n\ud83d\udccf Modified: 2025-01-07T16:25:05.769Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/justified-image-gallery/vulnerability/wordpress-justified-image-gallery-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-07T16:39:50.000000Z"}, {"uuid": "b776214a-7a03-4bfd-aefb-d1b4c1f7ed4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22516", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/466", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22516\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hitesh Patel Metadata SEO allows Stored XSS.This issue affects Metadata SEO: from n/a through 2.3.\n\ud83d\udccf Published: 2025-01-07T14:57:35.075Z\n\ud83d\udccf Modified: 2025-01-07T16:24:00.197Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/metadata-seo/vulnerability/wordpress-metadata-seo-plugin-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-07T16:41:26.000000Z"}, {"uuid": "e77da14c-07f1-4bb6-83da-2b57d236a052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22515", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/470", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22515\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Simon Chuang Show Google Analytics widget allows Stored XSS.This issue affects Show Google Analytics widget: from n/a through 1.5.4.\n\ud83d\udccf Published: 2025-01-07T14:57:35.619Z\n\ud83d\udccf Modified: 2025-01-07T16:23:27.090Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/show-google-analytics-widget/vulnerability/wordpress-show-google-analytics-widget-plugin-1-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-07T16:41:54.000000Z"}, {"uuid": "3f0dcf18-b4f0-4769-9f4d-6c1e60079da0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22511", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/473", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22511\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ella van Durpe Slides &amp; Presentations allows Stored XSS.This issue affects Slides &amp; Presentations: from n/a through 0.0.39.\n\ud83d\udccf Published: 2025-01-07T14:57:36.630Z\n\ud83d\udccf Modified: 2025-01-07T16:22:19.502Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/slide/vulnerability/wordpress-slides-presentations-plugin-0-0-39-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-07T16:42:58.000000Z"}, {"uuid": "b816f09a-788d-46cb-b129-66fea091d726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22512", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/472", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22512\n\ud83d\udd39 Description: Missing Authorization vulnerability in Sprout Apps Help Scout allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Help Scout: from n/a through 6.5.1.\n\ud83d\udccf Published: 2025-01-07T14:57:36.128Z\n\ud83d\udccf Modified: 2025-01-07T16:22:59.304Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/help-scout/vulnerability/wordpress-help-scout-plugin-6-5-1-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-07T16:42:38.000000Z"}, {"uuid": "a29bead9-ee1d-4d48-9e8f-e219b37895d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22517", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/477", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22517\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ben Huson List Pages at Depth allows Stored XSS.This issue affects List Pages at Depth: from n/a through 1.5.\n\ud83d\udccf Published: 2025-01-07T14:57:34.570Z\n\ud83d\udccf Modified: 2025-01-07T17:28:27.406Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/list-pages-at-depth/vulnerability/wordpress-list-pages-at-depth-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-07T17:37:54.000000Z"}]}