{"vulnerability": "CVE-2025-29914", "sightings": [{"uuid": "487997b1-7dbc-4384-87a3-9af7b4808f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29914", "type": "seen", "source": "https://gist.github.com/alon710/19367fed712521a1833c7c1711d66e07", "content": "", "creation_timestamp": "2026-01-24T21:30:35.000000Z"}, {"uuid": "04fb109d-fd1b-4f69-ad35-9b3b921e6b3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29914", "type": "seen", "source": "https://gist.github.com/alon710/c2368f00bd72d41149f54bfc49fec47c", "content": "", "creation_timestamp": "2026-01-24T21:30:36.000000Z"}, {"uuid": "5843cb60-2126-437b-9fbc-cfa1aa5cd734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29914", "type": "seen", "source": "https://gist.github.com/alon710/d47e577d192090116b68a7b27e69bca4", "content": "", "creation_timestamp": "2026-01-24T22:42:37.000000Z"}, {"uuid": "ab0ca2f6-4608-48c8-95eb-9931bccddd01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29914", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114196115958327030", "content": "", "creation_timestamp": "2025-03-20T18:14:06.212050Z"}, {"uuid": "dc6f68fe-3699-4c91-a163-3fe4e7294df5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29914", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lktlxbbjaq2n", "content": "", "creation_timestamp": "2025-03-20T21:04:11.872247Z"}, {"uuid": "5702c3a8-210b-4f8a-bd16-c505df781922", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29914", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8257", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29914\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.\n\ud83d\udccf Published: 2025-03-20T17:44:59.024Z\n\ud83d\udccf Modified: 2025-03-20T17:44:59.024Z\n\ud83d\udd17 References:\n1. https://github.com/corazawaf/coraza/security/advisories/GHSA-q9f5-625g-xm39\n2. https://github.com/corazawaf/coraza/commit/4722c9ad0d502abd56b8d6733c6b47eb4111742d", "creation_timestamp": "2025-03-20T18:20:54.000000Z"}, {"uuid": "c4328997-f49a-4200-bcac-ca93b152d7da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29914", "type": "seen", "source": "https://t.me/cvedetector/20770", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29914 - Coraza WAF REQUEST_FILENAME Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29914 \nPublished : March 20, 2025, 6:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T21:35:12.000000Z"}]}