{"vulnerability": "CVE-2025-2576", "sightings": [{"uuid": "74be0a31-6aa8-44d6-b0a5-f18d2178af51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25769", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114060591507466269", "content": "", "creation_timestamp": "2025-02-24T19:48:26.980489Z"}, {"uuid": "59879316-b33d-4ef3-9eb8-782480151ecf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25763", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljt7pyfk4y2m", "content": "", "creation_timestamp": "2025-03-08T00:00:07.299458Z"}, {"uuid": "e6e3060e-d6a2-41a4-aaf5-35b43a5b914f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25763", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvm3qg37322f", "content": "", "creation_timestamp": "2025-08-04T21:02:27.488815Z"}, {"uuid": "f5507574-072f-4653-b76d-aaea6ba491c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25761", "type": "seen", "source": "https://t.me/cvedetector/19066", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25761 - HkCms File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25761 \nPublished : Feb. 27, 2025, 3:15 p.m. | 2\u00a0hours, 16\u00a0minutes ago \nDescription : HkCms v2.3.2.240702 was discovered to contain an arbitrary file write vulnerability in the component Appcenter.php. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T19:16:00.000000Z"}, {"uuid": "012858c5-1854-4b3d-bcdc-70cf0ce1b6e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25760", "type": "seen", "source": "https://t.me/cvedetector/19065", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25760 - SUCMS SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25760 \nPublished : Feb. 27, 2025, 3:15 p.m. | 2\u00a0hours, 16\u00a0minutes ago \nDescription : A Server-Side Request Forgery (SSRF) in the component admin_webgather.php of SUCMS v1.0 allows attackers to access internal data and services via a crafted GET request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T19:15:59.000000Z"}, {"uuid": "229c0573-2d09-4a5d-86a0-04eb838dd2f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25761", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5677", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25761\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: HkCms v2.3.2.240702 was discovered to contain an arbitrary file write vulnerability in the component Appcenter.php.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T14:19:12.312Z\n\ud83d\udd17 References:\n1. https://github.com/147536951/Qianyi-learn/blob/main/Hkcms.pdf", "creation_timestamp": "2025-02-27T14:27:05.000000Z"}, {"uuid": "33e76cc6-60d8-4c7e-99dc-058ae0fecba0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2576", "type": "seen", "source": "https://t.me/cvedetector/21143", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2576 - Ayyash Studio WordPress Kick-Start Kit Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2576 \nPublished : March 26, 2025, 3:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : The Ayyash Studio \u2014 The kick-start kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T05:31:39.000000Z"}, {"uuid": "8843394f-bcf6-4968-822f-be05534e2ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25763", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114123350693779612", "content": "", "creation_timestamp": "2025-03-07T21:49:02.168322Z"}, {"uuid": "14e4f041-657e-46be-9e1b-507d7e52eb4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2576", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llaz4nv6bp2h", "content": "", "creation_timestamp": "2025-03-26T05:04:23.550337Z"}, {"uuid": "553630f2-c39f-451c-94fe-73004f0d012f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25760", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj6hjgeobr2y", "content": "", "creation_timestamp": "2025-02-27T17:53:44.680413Z"}, {"uuid": "dd56b202-9eeb-4861-869a-af75a9ca0246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25763", "type": "seen", "source": "https://t.me/cvedetector/19754", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25763 - \"CRMEB SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2025-25763 \nPublished : March 6, 2025, 9:15 p.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : crmeb CRMEB-KY v5.4.0 and before has a SQL Injection vulnerability at getRead() in /system/SystemDatabackupServices.php \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T23:52:54.000000Z"}, {"uuid": "3bcd12b1-9946-4790-a197-2a5b037deae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25766", "type": "seen", "source": "https://t.me/cvedetector/18667", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25766 - MRCMS Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-25766 \nPublished : Feb. 21, 2025, 6:16 p.m. | 22\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /file/savefile.do of MRCMS v3.1.2 allows attackers to execute arbitrary code via uploading a crafted .jsp file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T19:46:36.000000Z"}, {"uuid": "bfaead24-217a-4faf-a350-820f39ed1b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25765", "type": "seen", "source": "https://t.me/cvedetector/18666", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25765 - MRCMS Unauthenticated Arbitrary File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25765 \nPublished : Feb. 21, 2025, 6:16 p.m. | 22\u00a0minutes ago \nDescription : MRCMS v3.1.2 was discovered to contain an arbitrary file write vulnerability via the component /file/save.do. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T19:46:36.000000Z"}, {"uuid": "7b705b65-a68c-4d6c-ae2b-14cddf6f6b02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25765", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4935", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25765\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: MRCMS v3.1.2 was discovered to contain an arbitrary file write vulnerability via the component /file/save.do.\n\ud83d\udccf Published: 2025-02-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T18:10:45.945Z\n\ud83d\udd17 References:\n1. https://flowus.cn/share/be03dd2c-b760-457a-a919-e388d7566ff2", "creation_timestamp": "2025-02-21T18:18:48.000000Z"}, {"uuid": "492f9fb0-4f2f-451b-8b9e-8789014f32e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25766", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4934", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25766\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An arbitrary file upload vulnerability in the component /file/savefile.do of MRCMS v3.1.2 allows attackers to execute arbitrary code via uploading a crafted .jsp file.\n\ud83d\udccf Published: 2025-02-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T18:12:03.911Z\n\ud83d\udd17 References:\n1. https://flowus.cn/share/7097c747-ae3e-4cef-a198-285863698607", "creation_timestamp": "2025-02-21T18:18:47.000000Z"}, {"uuid": "867397a9-52e8-49b2-bc19-2d7a45bfe4c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25760", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5678", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25760\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Server-Side Request Forgery (SSRF) in the component admin_webgather.php of SUCMS v1.0 allows attackers to access internal data and services via a crafted GET request.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T14:19:10.733Z\n\ud83d\udd17 References:\n1. https://github.com/147536951/Qianyi-learn/blob/main/SUCMS2.pdf", "creation_timestamp": "2025-02-27T14:27:06.000000Z"}, {"uuid": "b2a0bdec-8d66-4a72-b495-f676c933e2a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25763", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6746", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25763\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: crmeb CRMEB-KY v5.4.0 and before has a SQL Injection vulnerability at getRead() in /system/SystemDatabackupServices.php\n\ud83d\udccf Published: 2025-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:08:14.955Z\n\ud83d\udd17 References:\n1. https://github.com/J-0k3r/sql/blob/main/sql.pdf\n2. https://github.com/J-0k3r/CVE-2025-25763", "creation_timestamp": "2025-03-06T20:34:10.000000Z"}, {"uuid": "a779719f-a876-4c24-9c2d-859a429287dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2576", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8797", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2576\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Ayyash Studio \u2014 The kick-start kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.\n\ud83d\udccf Published: 2025-03-26T02:23:48.216Z\n\ud83d\udccf Modified: 2025-03-26T02:23:48.216Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/634fa1ed-ad6b-4875-b6f9-f20add39dc80?source=cve\n2. https://plugins.trac.wordpress.org/browser/ayyash-studio/tags/1.0.3/includes/Importer/Wxr/StudioImporter.php#L351\n3. https://plugins.trac.wordpress.org/browser/ayyash-studio/tags/1.0.3/includes/Importer/Wxr/StudioImporter.php#L37\n4. https://wordpress.org/plugins/ayyash-studio/#developers", "creation_timestamp": "2025-03-26T03:25:11.000000Z"}, {"uuid": "44d20b16-9c7e-466c-bdf7-716d04089255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25763", "type": "seen", "source": "Telegram/kYBxqFuqk-DA_wOHELTgFsClxfj5C_ZhPQSAd8DskQu3Nxan", "content": "", "creation_timestamp": "2025-03-08T04:35:53.000000Z"}, {"uuid": "50733846-b4f1-4b6f-ba57-88eb1271dbe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25769", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lix3n4v65s23", "content": "", "creation_timestamp": "2025-02-24T19:32:22.846604Z"}, {"uuid": "12a0eb45-d14e-415a-b8e4-5f46c9006725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25760", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}, {"uuid": "0729a482-6d94-4720-92af-df300dccb1a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25769", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:04.000000Z"}, {"uuid": "ee850463-c35e-4a4f-bd6f-bafb5c0b7e58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25768", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:04.000000Z"}, {"uuid": "d6226ade-0cdb-4122-88b8-b306501b7c31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25769", "type": "seen", "source": "https://t.me/cvedetector/18688", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25769 - Wangmarket CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25769 \nPublished : Feb. 21, 2025, 7:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Wangmarket v4.10 to v5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /controller/UserController.java. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T22:17:18.000000Z"}, {"uuid": "cbe572a5-a94d-4dd7-bee5-c57b05a036de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25768", "type": "seen", "source": "https://t.me/cvedetector/18687", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25768 - MRCMS Server-Side Template Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25768 \nPublished : Feb. 21, 2025, 7:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : MRCMS v3.1.2 was discovered to contain a server-side template injection (SSTI) vulnerability in the component \\servlet\\DispatcherServlet.java. This vulnerability allows attackers to execute arbitrary code via a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T22:17:14.000000Z"}, {"uuid": "a1e06c2f-2729-4bde-8c73-fec7c47e0a23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25767", "type": "seen", "source": "https://t.me/cvedetector/18686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25767 - MRCMS Vertical Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25767 \nPublished : Feb. 21, 2025, 7:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : A vertical privilege escalation vulnerability in the component /controller/UserController.java of MRCMS v3.1.2 allows attackers to arbitrarily delete users via a crafted request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T22:17:13.000000Z"}, {"uuid": "aef0c8ff-2397-4e35-aec0-a4c7848bf90b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25769", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5201", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25769\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Wangmarket v4.10 to v5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /controller/UserController.java.\n\ud83d\udccf Published: 2025-02-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-24T17:18:51.996Z\n\ud83d\udd17 References:\n1. https://flowus.cn/share/56c86622-1e4d-47ed-923c-9e37aff00079", "creation_timestamp": "2025-02-24T18:26:45.000000Z"}]}