{"vulnerability": "CVE-2025-3227", "sightings": [{"uuid": "c15b20d5-321c-457f-bfb2-b66efa407da0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32270", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10499", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32270\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Broadstreet Broadstreet allows Cross Site Request Forgery. This issue affects Broadstreet: from n/a through 1.51.1.\n\ud83d\udccf Published: 2025-04-04T15:59:43.923Z\n\ud83d\udccf Modified: 2025-04-04T15:59:43.923Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/broadstreet/vulnerability/wordpress-broadstreet-plugin-1-51-1-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-04T16:37:03.000000Z"}, {"uuid": "a52151da-09ed-49d9-8707-e74b0017d692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32271", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10498", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32271\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing allows Cross Site Request Forgery. This issue affects Woocommerce Role Pricing: from n/a through 3.5.5.\n\ud83d\udccf Published: 2025-04-04T15:59:44.635Z\n\ud83d\udccf Modified: 2025-04-04T15:59:44.635Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/woocommerce-role-pricing/vulnerability/wordpress-woocommerce-role-pricing-plugin-3-5-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-04T16:37:02.000000Z"}, {"uuid": "91bbef71-425b-443d-afd2-2be4298cf4a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32276", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10494", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32276\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Qu\u00fd L\u00ea 91 Administrator Z allows Cross Site Request Forgery. This issue affects Administrator Z: from n/a through 2025.03.04.\n\ud83d\udccf Published: 2025-04-04T15:59:47.428Z\n\ud83d\udccf Modified: 2025-04-04T15:59:47.428Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/administrator-z/vulnerability/wordpress-administrator-z-plugin-2025-03-04-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-04T16:36:56.000000Z"}, {"uuid": "8278981f-ee39-4b5e-90ef-3f06643768db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32277", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10493", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32277\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Missing Authorization vulnerability in Ateeq Rafeeq RepairBuddy allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects RepairBuddy: from n/a through 3.8211.\n\ud83d\udccf Published: 2025-04-04T15:59:48.123Z\n\ud83d\udccf Modified: 2025-04-04T15:59:48.123Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/computer-repair-shop/vulnerability/wordpress-repairbuddy-plugin-3-8211-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-04T16:36:55.000000Z"}, {"uuid": "b4a0a9a3-667e-4c43-9c53-fb1a3b7494d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32278", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10492", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32278\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in wprio Table Block by RioVizual allows Cross Site Request Forgery. This issue affects Table Block by RioVizual: from n/a through 2.1.7.\n\ud83d\udccf Published: 2025-04-04T15:59:48.783Z\n\ud83d\udccf Modified: 2025-04-04T15:59:48.783Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/riovizual/vulnerability/wordpress-table-block-by-riovizual-plugin-2-1-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-04T16:36:51.000000Z"}, {"uuid": "0cdfc7be-7297-409d-9eff-1b3f7397ef45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32272", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10497", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32272\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in PickPlugins Wishlist allows Cross Site Request Forgery. This issue affects Wishlist: from n/a through 1.0.44.\n\ud83d\udccf Published: 2025-04-04T15:59:45.434Z\n\ud83d\udccf Modified: 2025-04-04T15:59:45.434Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wishlist/vulnerability/wordpress-wishlist-plugin-1-0-41-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-04T16:36:58.000000Z"}, {"uuid": "cb2a5117-a399-475f-806d-bf5b7424e7d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32273", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10496", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32273\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in freetobook Freetobook Responsive Widget allows Cross Site Request Forgery. This issue affects Freetobook Responsive Widget: from n/a through 1.1.\n\ud83d\udccf Published: 2025-04-04T15:59:46.031Z\n\ud83d\udccf Modified: 2025-04-04T15:59:46.031Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/freetobook-responsive-widget/vulnerability/wordpress-freetobook-responsive-widget-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-04T16:36:58.000000Z"}, {"uuid": "635a51ea-5968-4685-843f-38020784cf00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32274", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10495", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32274\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in axew3 WP w3all phpBB allows Cross Site Request Forgery. This issue affects WP w3all phpBB: from n/a through 2.9.2.\n\ud83d\udccf Published: 2025-04-04T15:59:46.707Z\n\ud83d\udccf Modified: 2025-04-04T15:59:46.707Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-w3all-phpbb-integration/vulnerability/wordpress-w3all-phpbb-integration-plugin-2-9-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-04T16:36:57.000000Z"}, {"uuid": "9cc7ca7d-8efa-49b6-aab7-06a51374affc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32273", "type": "seen", "source": "https://t.me/cvedetector/22162", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32273 - Freetobook Responsive Widget CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32273 \nPublished : April 4, 2025, 4:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in freetobook Freetobook Responsive Widget allows Cross Site Request Forgery. This issue affects Freetobook Responsive Widget: from n/a through 1.1. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T20:32:21.000000Z"}, {"uuid": "65ca0eb8-c3b7-44f0-b0cf-b75de9de05d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32274", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyvpxhisy2z", "content": "", "creation_timestamp": "2025-04-04T17:07:29.340157Z"}, {"uuid": "6b4148a6-6366-4f5a-9246-2f3a67893ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32270", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyvpxqotn2h", "content": "", "creation_timestamp": "2025-04-04T17:07:30.049170Z"}, {"uuid": "ca4aae01-c80b-43d8-b5e9-c5e1d079b1c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32276", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyvpxu27o2i", "content": "", "creation_timestamp": "2025-04-04T17:07:30.675774Z"}, {"uuid": "7e6ffbd2-99c2-4aa6-befe-00d6b4cb7cac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32273", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyvpy2s3f2h", "content": "", "creation_timestamp": "2025-04-04T17:07:31.872978Z"}, {"uuid": "a4e081cd-b775-44e0-bcbb-31997ad728bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32271", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyvpyilif2h", "content": "", "creation_timestamp": "2025-04-04T17:07:34.319735Z"}, {"uuid": "410d3c2b-d504-4fa6-9480-02cc756179c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32278", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyvpylubc2x", "content": "", "creation_timestamp": "2025-04-04T17:07:34.840972Z"}, {"uuid": "6e47d5fa-ea3e-4c8a-8e27-ed598d56458a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32277", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyvpyvx4v26", "content": "", "creation_timestamp": "2025-04-04T17:07:36.983705Z"}, {"uuid": "ab3d4b7c-3679-4f7e-a8e6-45e2cb8d3405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32272", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llyvpz4p3l2b", "content": "", "creation_timestamp": "2025-04-04T17:07:38.163259Z"}, {"uuid": "8132150a-572a-462a-ac2c-294503f3787e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32275", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmhfsnepfe2u", "content": "", "creation_timestamp": "2025-04-10T11:32:43.058475Z"}, {"uuid": "45b5f932-ca3f-4bc1-9cf4-66d61fa09461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32275", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11200", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32275\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Authentication Bypass by Spoofing vulnerability in Ays Pro Survey Maker allows Identity Spoofing. This issue affects Survey Maker: from n/a through 5.1.5.4.\n\ud83d\udccf Published: 2025-04-10T08:09:47.813Z\n\ud83d\udccf Modified: 2025-04-10T08:09:47.813Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/survey-maker/vulnerability/wordpress-survey-maker-plugin-5-1-5-0-bypass-vulnerability-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-10T08:48:42.000000Z"}, {"uuid": "ce52237b-e9c1-4ce7-9f4b-70a00f031a96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32279", "type": "seen", "source": "https://t.me/cvedetector/22474", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32279 - Shahjada Live Forms Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32279 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Shahjada Live Forms. This issue affects Live Forms: from n/a through 4.8.5. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:20.000000Z"}, {"uuid": "e67fda90-5474-47f9-8816-7bad122cc9fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32275", "type": "seen", "source": "https://t.me/cvedetector/22632", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32275 - Ays Pro Survey Maker Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-32275 \nPublished : April 10, 2025, 8:15 a.m. | 48\u00a0minutes ago \nDescription : Authentication Bypass by Spoofing vulnerability in Ays Pro Survey Maker allows Identity Spoofing. This issue affects Survey Maker: from n/a through 5.1.5.4. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T11:10:41.000000Z"}, {"uuid": "56c6b053-cccf-4ea6-8910-5f01cbff81b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32276", "type": "seen", "source": "https://t.me/cvedetector/22153", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32276 - Qu\u00fd L\u00ea 91 Administrator Z CSRF\", \n  \"Content\": \"CVE ID : CVE-2025-32276 \nPublished : April 4, 2025, 4:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Qu\u00fd L\u00ea 91 Administrator Z allows Cross Site Request Forgery. This issue affects Administrator Z: from n/a through 2025.03.04. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T20:32:08.000000Z"}, {"uuid": "0a457a12-563d-4f13-b448-f873e6d51c67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3227", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18959", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3227\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Mattermost versions 10.5.x &lt;= 10.5.5, 9.11.x &lt;= 9.11.15, 10.8.x &lt;= 10.8.0, 10.7.x &lt;= 10.7.2, 10.6.x &lt;= 10.6.5 fail to properly enforce channel member management permissions in playbook runs, allowing authenticated users without the 'Manage Channel Members' permission to add or remove users from public and private channels by manipulating playbook run participants when the run is linked to a channel.\n\ud83d\udccf Published: 2025-06-20T14:31:48.644Z\n\ud83d\udccf Modified: 2025-06-20T14:31:48.644Z\n\ud83d\udd17 References:\n1. https://mattermost.com/security-updates", "creation_timestamp": "2025-06-20T14:43:35.000000Z"}, {"uuid": "b0ff0413-b334-486e-93b7-df87f60c03ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32272", "type": "seen", "source": "https://t.me/cvedetector/22159", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32272 - PickPlugins Wishlist CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32272 \nPublished : April 4, 2025, 4:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in PickPlugins Wishlist allows Cross Site Request Forgery. This issue affects Wishlist: from n/a through 1.0.44. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T20:32:16.000000Z"}, {"uuid": "5f974a67-6db4-42e6-80ff-4850bc5c78f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32271", "type": "seen", "source": "https://t.me/cvedetector/22158", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32271 - Ablancodev Woocommerce Role Pricing CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32271 \nPublished : April 4, 2025, 4:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing allows Cross Site Request Forgery. This issue affects Woocommerce Role Pricing: from n/a through 3.5.5. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T20:32:15.000000Z"}, {"uuid": "ea84957c-c98c-4fcb-9f0d-c11c38731809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32270", "type": "seen", "source": "https://t.me/cvedetector/22157", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32270 - Broadstreet CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32270 \nPublished : April 4, 2025, 4:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Broadstreet Broadstreet allows Cross Site Request Forgery. This issue affects Broadstreet: from n/a through 1.51.1. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T20:32:15.000000Z"}, {"uuid": "1e767525-455a-45e7-a86d-02097a589be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32274", "type": "seen", "source": "https://t.me/cvedetector/22160", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32274 - w3all phpBB CSRF Attack\", \n  \"Content\": \"CVE ID : CVE-2025-32274 \nPublished : April 4, 2025, 4:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in axew3 WP w3all phpBB allows Cross Site Request Forgery. This issue affects WP w3all phpBB: from n/a through 2.9.2. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T20:32:17.000000Z"}, {"uuid": "16a2ed6a-0413-4a09-bdec-1cdbe25ec3b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32278", "type": "seen", "source": "https://t.me/cvedetector/22155", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32278 - RioVizual wprio Table Block CSRF\", \n  \"Content\": \"CVE ID : CVE-2025-32278 \nPublished : April 4, 2025, 4:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in wprio Table Block by RioVizual allows Cross Site Request Forgery. This issue affects Table Block by RioVizual: from n/a through 2.1.7. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T20:32:10.000000Z"}, {"uuid": "35f2b107-0f5e-4150-981f-25a5dcbe14b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32277", "type": "seen", "source": "https://t.me/cvedetector/22154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32277 - RepairBuddy Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32277 \nPublished : April 4, 2025, 4:15 p.m. | 1\u00a0hour, 44\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Ateeq Rafeeq RepairBuddy allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects RepairBuddy: from n/a through 3.8211. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T20:32:09.000000Z"}]}