{"vulnerability": "CVE-2025-26594", "sightings": [{"uuid": "d5ad3da8-75f8-4524-93b9-f3decc770633", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26594", "type": "seen", "source": "MISP/8e1b6542-ae86-4729-a7a6-4e9f670b8bb7", "content": "", "creation_timestamp": "2025-08-22T17:25:06.000000Z"}, {"uuid": "c8d651be-3c61-4095-880d-0f457855e395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26594", "type": "seen", "source": "https://t.me/cvedetector/18894", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26594 - X.Org Xwayland Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26594 \nPublished : Feb. 25, 2025, 4:15 p.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-25T19:03:30.000000Z"}, {"uuid": "84ea837f-a0ad-4ae8-aaea-d66bc9203e58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26594", "type": "seen", "source": "Telegram/zfToAAWf8eWnJ7ba07A0EZZ_iZLhP55gYdeGjYzJA6KMcCw", "content": "", "creation_timestamp": "2026-04-06T15:19:47.000000Z"}, {"uuid": "4f6ac428-66bc-405a-b98f-f4555f23e69f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26594", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-143/", "content": "", "creation_timestamp": "2025-03-13T04:00:00.000000Z"}, {"uuid": "6152cfe8-f519-4308-b6e3-eaeefc03ff4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26594", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9013", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26594\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.\n\ud83d\udccf Published: 2025-02-25T15:53:51.324Z\n\ud83d\udccf Modified: 2025-03-27T04:19:40.033Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:2500\n2. https://access.redhat.com/errata/RHSA-2025:2502\n3. https://access.redhat.com/errata/RHSA-2025:2861\n4. https://access.redhat.com/errata/RHSA-2025:2862\n5. https://access.redhat.com/errata/RHSA-2025:2865\n6. https://access.redhat.com/errata/RHSA-2025:2866\n7. https://access.redhat.com/errata/RHSA-2025:2873\n8. https://access.redhat.com/errata/RHSA-2025:2874\n9. https://access.redhat.com/errata/RHSA-2025:2875\n10. https://access.redhat.com/errata/RHSA-2025:2879\n11. https://access.redhat.com/errata/RHSA-2025:2880\n12. https://access.redhat.com/security/cve/CVE-2025-26594\n13. https://bugzilla.redhat.com/show_bug.cgi?id=2345248", "creation_timestamp": "2025-03-27T04:25:59.000000Z"}, {"uuid": "e346ebbd-cd82-4974-b319-7dee0fecec35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26594", "type": "seen", "source": "Telegram/xCiKQBEyXIm3dJMLXX-cjIQO0nlbNHWZBBldlozSAv4Xnni0", "content": "", "creation_timestamp": "2025-03-10T14:45:05.000000Z"}, {"uuid": "6692e6d5-2a02-4ecb-b80f-c7eb8d1a7534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26594", "type": "seen", "source": "https://bsky.app/profile/bsd.cafe/post/3lj2tzliwsqw2", "content": "", "creation_timestamp": "2025-02-26T07:27:09.356072Z"}, {"uuid": "a1590229-2d82-483c-9f8c-fdf6d91c6f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26594", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114065731196406120", "content": "", "creation_timestamp": "2025-02-25T17:35:32.212914Z"}]}