{"vulnerability": "CVE-2025-2789", "sightings": [{"uuid": "e1bef768-249f-4099-b11e-70f144e06b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27893", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114143957417849617", "content": "", "creation_timestamp": "2025-03-11T13:09:29.511831Z"}, {"uuid": "ac5445af-d900-4a3e-84e0-66593e774ddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/campuscodi.risky.biz/post/3lmhq7wh5zk2w", "content": "", "creation_timestamp": "2025-04-10T14:38:56.790828Z"}, {"uuid": "840dfe24-4977-4c07-be58-309815df58f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmv5megosj2j", "content": "", "creation_timestamp": "2025-04-15T22:43:11.599912Z"}, {"uuid": "0d64ea96-ab3a-4d76-95a4-a0b7a3238431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-27892.yaml", "content": "", "creation_timestamp": "2025-04-22T12:39:12.000000Z"}, {"uuid": "a0064e42-cae0-4311-815d-59f25b9b92da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2789", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10713", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2789\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The MultiVendorX \u2013 Empower Your WooCommerce Store with a Dynamic Multivendor Marketplace \u2013 Build the Next Amazon, eBay, Etsy plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_table_rate_shipping_row function in all versions up to, and including, 4.2.19. This makes it possible for unauthenticated attackers to delete Table Rates that can impact the shipping cost calculations.\n\ud83d\udccf Published: 2025-04-05T05:32:14.306Z\n\ud83d\udccf Modified: 2025-04-07T14:11:36.041Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/bf4eca37-066f-428c-a4f7-061ce06e1142?source=cve\n2. https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.19/packages/mvx-tablerate/mvx-tablerate.php#L78\n3. https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.19/packages/mvx-tablerate/mvx-tablerate.php#L211", "creation_timestamp": "2025-04-07T14:45:11.000000Z"}, {"uuid": "e487e643-ea08-476c-b845-509878ad0e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27891", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16995", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27891\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400. The lack of a length check leads to out-of-bounds reads via malformed NAS packets.\n\ud83d\udccf Published: 2025-05-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-20T14:27:14.444Z\n\ud83d\udd17 References:\n1. https://semiconductor.samsung.com/support/quality-support/product-security-updates/\n2. https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-27891/", "creation_timestamp": "2025-05-20T14:41:01.000000Z"}, {"uuid": "72d79ddf-92d5-4f0d-a9ab-eba30b9b7b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://t.me/cvedetector/23032", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27892 - Shopware SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27892 \nPublished : April 15, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T01:49:06.000000Z"}, {"uuid": "77f87ecb-778f-4d1b-afe1-16daeba42e5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27893", "type": "seen", "source": "https://t.me/cvedetector/20054", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27893 - Archer Platform Immutable Field Manipulation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27893 \nPublished : March 11, 2025, 9:15 a.m. | 50\u00a0minutes ago \nDescription : In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. This enables unauthorized modification of system-generated metadata, compromising data integrity and potentially impacting auditing, compliance, and security controls. \nSeverity: 1.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T11:46:20.000000Z"}, {"uuid": "7a860ee4-3915-4d7a-b820-7e3010a5c366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12139", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27892\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-16T18:32:23.303Z\n\ud83d\udd17 References:\n1. https://github.com/shopware/shopware/security/advisories/GHSA-8g35-7rmw-7f59\n2. https://www.redteam-pentesting.de/en/advisories/rt-sa-2025-001/", "creation_timestamp": "2025-04-16T18:56:18.000000Z"}, {"uuid": "942d7a0b-2000-4bcb-993c-e41da72598cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lnlm6a2lkd2t", "content": "", "creation_timestamp": "2025-04-24T21:02:20.127212Z"}, {"uuid": "eac025d7-1af6-40b5-86bb-3ac1a0ead72c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27891", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp63whpfze2t", "content": "", "creation_timestamp": "2025-05-14T22:57:27.195554Z"}, {"uuid": "45a228d2-1d2e-48b9-8f4a-d5d9443f5260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2789", "type": "seen", "source": "https://t.me/cvedetector/22182", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2789 - MultiVendorX Unauthenticated Table Rates Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2789 \nPublished : April 5, 2025, 6:15 a.m. | 19\u00a0minutes ago \nDescription : The MultiVendorX \u2013 Empower Your WooCommerce Store with a Dynamic Multivendor Marketplace \u2013 Build the Next Amazon, eBay, Etsy plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_table_rate_shipping_row function in all versions up to, and including, 4.2.19. This makes it possible for unauthenticated attackers to delete Table Rates that can impact the shipping cost calculations. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-05T09:04:04.000000Z"}]}