{"vulnerability": "CVE-2025-27500", "sightings": [{"uuid": "cd1f2573-5cd4-43b6-970b-b570095c3031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27500", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114100218515671455", "content": "", "creation_timestamp": "2025-03-03T19:46:07.251619Z"}, {"uuid": "4e71d56c-db94-4b50-b302-0185bbd484e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27500", "type": "seen", "source": "Telegram/EME7AmmlemJIAsxowp-8JDy-sBeDJ56pHelrEfJutMhJTEON", "content": "", "creation_timestamp": "2025-03-06T02:17:23.000000Z"}, {"uuid": "e4c6cf17-3c5a-4350-b627-f49432d51fde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27500", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6273", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27500\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N)\n\ud83d\udd39 Description: OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1.\n\ud83d\udccf Published: 2025-03-03T18:30:48.198Z\n\ud83d\udccf Modified: 2025-03-03T20:22:19.785Z\n\ud83d\udd17 References:\n1. https://github.com/openziti/ziti-console/security/advisories/GHSA-frxm-vm48-5qf2", "creation_timestamp": "2025-03-03T20:30:35.000000Z"}, {"uuid": "02487f97-f2cc-46c5-b077-28f044fe7c11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27500", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114102115018411208", "content": "", "creation_timestamp": "2025-03-04T03:48:25.255205Z"}, {"uuid": "971f463b-ce59-4ec8-9d66-71fd0fa60479", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27500", "type": "seen", "source": "https://t.me/cvedetector/19393", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27500 - OpenZiti Unauthenticated Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27500 \nPublished : March 3, 2025, 7:15 p.m. | 1\u00a0hour, 6\u00a0minutes ago \nDescription : OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T21:24:31.000000Z"}]}