{"vulnerability": "CVE-2025-26656", "sightings": [{"uuid": "d89cbc0f-f52f-4ec9-aa6b-c7ebe8bd956a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26656", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk3625yi5z2h", "content": "", "creation_timestamp": "2025-03-11T03:51:19.547078Z"}, {"uuid": "13d753e0-f712-41db-afba-5be247dae99a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26656", "type": "seen", "source": "https://t.me/cvedetector/20014", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26656 - SAP Manage Purchasing Info Records Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-26656 \nPublished : March 11, 2025, 1:15 a.m. | 24\u00a0minutes ago \nDescription : OData Service in Manage Purchasing Info Records does not perform necessary authorization checks for an authenticated user, allowing an attacker to escalate privileges. This has low impact on integrity of the application. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T03:24:35.000000Z"}, {"uuid": "a6aa6eeb-3bcb-46ac-b617-fdea205ce846", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26656", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7090", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26656\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: OData Service in Manage Purchasing Info Records does not perform necessary authorization checks for an authenticated user, allowing an attacker to escalate privileges. This has low impact on integrity of the application.\n\ud83d\udccf Published: 2025-03-11T00:35:18.381Z\n\ud83d\udccf Modified: 2025-03-11T00:35:18.381Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3474392\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-03-11T01:41:33.000000Z"}]}