{"vulnerability": "CVE-2025-3296", "sightings": [{"uuid": "6b304508-eb0c-4fc8-b1c1-bfaf1091e461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32962", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpciznlcbz2r", "content": "", "creation_timestamp": "2025-05-16T17:02:29.337307Z"}, {"uuid": "3d6994cb-1e27-4d0d-9697-fe567625b21b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114383596774137374", "content": "", "creation_timestamp": "2025-04-22T20:52:56.105326Z"}, {"uuid": "8ad4021a-dd26-4183-aae1-3e6113ed193a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32961", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngln25ir424", "content": "", "creation_timestamp": "2025-04-22T21:09:22.077074Z"}, {"uuid": "d94b00df-25dd-45c1-a3b8-dbe5422cb9aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32960", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngln2gvk424", "content": "", "creation_timestamp": "2025-04-22T21:09:22.863491Z"}, {"uuid": "71596a1c-5b65-4be1-8f79-6eeea337ed5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32963", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngln3joiv2d", "content": "", "creation_timestamp": "2025-04-22T21:09:29.123476Z"}, {"uuid": "711750a5-ab59-401d-9b78-551f204c05dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32964", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngln3qpox2t", "content": "", "creation_timestamp": "2025-04-22T21:09:30.384283Z"}, {"uuid": "5db2133a-5b8e-4552-84fe-6657b425b8b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngzdjd4xu2b", "content": "", "creation_timestamp": "2025-04-23T01:14:35.578856Z"}, {"uuid": "71da49bb-6fd0-4b4d-8150-2295d62fa4cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32969", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ly734q4c6q22", "content": "", "creation_timestamp": "2025-09-06T21:02:29.473746Z"}, {"uuid": "0f60d8ce-ba18-4bb7-8aa3-7e4bc9d073cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlbxlyel2w", "content": "", "creation_timestamp": "2025-08-03T21:03:00.152305Z"}, {"uuid": "21cddb2e-112a-4a15-bac9-dd3ea11404fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "seen", "source": "https://t.me/cvedetector/23560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32965 - XRP Ledger Malicious Code Exfiltration in xrpl.js\", \n  \"Content\": \"CVE ID : CVE-2025-32965 \nPublished : April 22, 2025, 9:15 p.m. | 47\u00a0minutes ago \nDescription : xrpl.js is a JavaScript/TypeScript API for interacting with the XRP Ledger in Node.js and the browser. Versions 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js were compromised and contained malicious code designed to exfiltrate private keys. Version 2.14.2 is also malicious, though it is less likely to lead to exploitation as it is not compatible with other 2.x versions. Anyone who used one of these versions should stop immediately and rotate any private keys or secrets used with affected systems. Users of xrpl.js should pgrade to version 4.2.5 or 2.14.3 to receive a patch. To secure funds, think carefully about whether any keys may have been compromised by this supply chain attack, and mitigate by sending funds to secure wallets, and/or rotating keys. If any account's master key is potentially compromised, disable the key. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T00:15:52.000000Z"}, {"uuid": "f3b9a052-8d6a-44e0-a980-55c2b657c96e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32964", "type": "seen", "source": "https://t.me/cvedetector/23557", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32964 - ManageWiki Extension Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32964 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 00bebea, when enabling a conflicting extension, a restricted extension would be automatically disabled even if the user did not hold the ManageWiki-restricted right. This issue has been patched in commit 00bebea. A workaround involves ensuring that any extensions requiring specific permissions in `$wgManageWikiExtensions` also require the same permissions for managing any conflicting extensions. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:38.000000Z"}, {"uuid": "9f1f9c24-a5e8-40b3-944c-04ff60f7792e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32963", "type": "seen", "source": "https://t.me/cvedetector/23556", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32963 - MinIO Operator STS Unauthenticated Kubernetes API Server Impersonation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32963 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : MinIO Operator STS is a native IAM Authentication for Kubernetes. Prior to version 7.1.0, if no audiences are provided for the `spec.audiences` field, the default will be of the Kubernetes apiserver. Without scoping, it can be replayed to other internal systems, which may unintentionally trust it. This issue has been patched in version 7.1.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:37.000000Z"}, {"uuid": "7df3252b-322f-4ef9-abad-167701493734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32961", "type": "seen", "source": "https://t.me/cvedetector/23555", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32961 - Cuba JPA Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-32961 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : The Cuba JPA web API enables loading and saving any entities defined in the application data model by sending simple HTTP requests. Prior to version 1.1.1, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in version 1.1.1. A workaround is provided on the Jmix documentation website. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:36.000000Z"}, {"uuid": "f6792bda-2f85-41af-b560-2968b612109f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32960", "type": "seen", "source": "https://t.me/cvedetector/23554", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32960 - CUBA REST API Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-32960 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : The CUBA REST API add-on performs operations on data and entities. Prior to version 7.2.7, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in version 7.2.7. A workaround is provided on the Jmix documentation website. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:36.000000Z"}, {"uuid": "bb75e477-b3ea-423a-9954-c9ddea4c845a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32966", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114388177097060487", "content": "", "creation_timestamp": "2025-04-23T16:17:46.233519Z"}, {"uuid": "20ae1d3d-d7e9-449e-a53c-329dc2655dc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32969", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114388282485493837", "content": "", "creation_timestamp": "2025-04-23T16:44:34.288205Z"}, {"uuid": "beb8e039-8ec8-4ec4-b02e-01e5435e1c86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32969", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnipaqcyvd2d", "content": "", "creation_timestamp": "2025-04-23T17:19:25.625381Z"}, {"uuid": "3916d92e-5063-47a1-a726-f10859633a45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32968", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnipaql7bc2v", "content": "", "creation_timestamp": "2025-04-23T17:19:26.981904Z"}, {"uuid": "c41f23f0-6369-4a1f-bd43-2ad61d999508", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32966", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnipar5enh2u", "content": "", "creation_timestamp": "2025-04-23T17:19:29.989108Z"}, {"uuid": "12b7aae6-87e5-416b-a369-46047d6f4de5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lnjwd2co5k2b", "content": "", "creation_timestamp": "2025-04-24T04:58:38.083196Z"}, {"uuid": "237305d4-c05b-46cb-8de2-6ffd61f0d389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lnk7dvmso22y", "content": "", "creation_timestamp": "2025-04-24T07:40:11.462485Z"}, {"uuid": "7e552928-fce8-46d2-aec8-948b2229daff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "seen", "source": "https://bsky.app/profile/prohoster.bsky.social/post/3lnrypo6yzb2j", "content": "", "creation_timestamp": "2025-04-27T10:02:46.418772Z"}, {"uuid": "a30b4277-24c6-425b-afb1-4840fcd11dfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32963", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13458", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32963\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: MinIO Operator STS is a native IAM Authentication for Kubernetes. Prior to version 7.1.0, if no audiences are provided for the `spec.audiences` field, the default will be of the Kubernetes apiserver. Without scoping, it can be replayed to other internal systems, which may unintentionally trust it. This issue has been patched in version 7.1.0.\n\ud83d\udccf Published: 2025-04-22T17:14:56.958Z\n\ud83d\udccf Modified: 2025-04-25T16:03:14.020Z\n\ud83d\udd17 References:\n1. https://github.com/minio/operator/security/advisories/GHSA-7m6v-q233-q9j9\n2. https://github.com/minio/operator/releases/tag/v7.1.0", "creation_timestamp": "2025-04-25T16:07:17.000000Z"}, {"uuid": "8c888d0f-b915-4923-8727-7a5fa56ed1e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33811", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30567 - WordPress WP01 &lt; Path traversal\nURL\uff1ahttps://github.com/yusufdalbudak/CVE-2025-32965-xrpl-js-poc\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-23T17:12:33.000000Z"}, {"uuid": "1706d253-9ea4-4e34-aafe-68c15a596d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33808", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30567 - WordPress WP01 &lt; Path traversal\nURL\uff1ahttps://github.com/yusufdalbudak/CVE-2025-32965-xrpl.js-Supply-Chain-Attack-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-23T09:27:23.000000Z"}, {"uuid": "ab2f0a07-79c7-409b-ac38-a518dabe182b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3296", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10601", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3296\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in SourceCodester Online Eyewear Shop 1.0. This issue affects some unknown processing of the file /classes/Users.php?f=delete_customer. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-05T08:00:14.365Z\n\ud83d\udccf Modified: 2025-04-05T08:00:14.365Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303491\n2. https://vuldb.com/?ctiid.303491\n3. https://vuldb.com/?submit.549932\n4. https://github.com/foreverfeifei/cve/blob/main/sql.md\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-04-05T08:37:14.000000Z"}, {"uuid": "07bc8645-d880-491d-9673-c6d3cc91c751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12980", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32965\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: xrpl.js is a JavaScript/TypeScript API for interacting with the XRP Ledger in Node.js and the browser. Versions 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js were compromised and contained malicious code designed to exfiltrate private keys. Version 2.14.2 is also malicious, though it is less likely to lead to exploitation as it is not compatible with other 2.x versions. Anyone who used one of these versions should stop immediately and rotate any private keys or secrets used with affected systems. Users of xrpl.js should pgrade to version 4.2.5 or 2.14.3 to receive a patch. To secure funds, think carefully about whether any keys may have been compromised by this supply chain attack, and mitigate by sending funds to secure wallets, and/or rotating keys. If any account's master key is potentially compromised, disable the key.\n\ud83d\udccf Published: 2025-04-22T20:39:48.452Z\n\ud83d\udccf Modified: 2025-04-22T20:39:48.452Z\n\ud83d\udd17 References:\n1. https://github.com/XRPLF/xrpl.js/security/advisories/GHSA-33qr-m49q-rxfx\n2. https://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor\n3. https://xrpl.org/docs/tutorials/how-tos/manage-account-settings/assign-a-regular-key-pair\n4. https://xrpl.org/docs/tutorials/how-tos/manage-account-settings/disable-master-key-pair", "creation_timestamp": "2025-04-22T21:04:20.000000Z"}, {"uuid": "6ac43ef1-4e70-4f8a-8a4a-0dd034dafe81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3296", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm2leadfyg2r", "content": "", "creation_timestamp": "2025-04-05T09:07:18.188247Z"}, {"uuid": "45ebab06-992f-4183-b93e-752d3d441860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32967", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpuam55pl22j", "content": "", "creation_timestamp": "2025-05-23T18:19:40.159898Z"}, {"uuid": "ce3615cd-e135-466e-9d90-dc737e77b9aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32967", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpurwb53ggj2", "content": "", "creation_timestamp": "2025-05-23T23:29:56.793434Z"}, {"uuid": "6f5a63bc-00fd-4c0b-9bf0-086e234dd6a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32969", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-32969.yaml", "content": "", "creation_timestamp": "2025-08-28T13:41:24.000000Z"}, {"uuid": "2d1df081-8714-4d85-8f16-d04072477116", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32969", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lxnhuaptxy2q", "content": "", "creation_timestamp": "2025-08-30T21:02:27.617434Z"}, {"uuid": "806403e7-7ff3-4a9b-93ff-a4c988daf3cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32969", "type": "seen", "source": "https://gist.github.com/alon710/fb15730874be9f6d45272679812c968e", "content": "", "creation_timestamp": "2026-01-24T22:43:07.000000Z"}, {"uuid": "e5bd24d7-e571-442f-87f1-cc27bb213358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32967", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17407", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32967\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: OpenEMR is a free and open source electronic health records and medical practice management application. A logging oversight in versions prior to 7.0.3.4 allows password change events to go unrecorded on the client-side log viewer, preventing administrators from auditing critical actions. This weakens traceability and opens the system to undetectable misuse by insiders or attackers. Version 7.0.3.4 contains a patch for the issue.\n\ud83d\udccf Published: 2025-05-23T15:31:52.551Z\n\ud83d\udccf Modified: 2025-05-23T15:40:15.258Z\n\ud83d\udd17 References:\n1. https://github.com/openemr/openemr/security/advisories/GHSA-7qj6-jxfc-xw4v", "creation_timestamp": "2025-05-23T15:44:32.000000Z"}, {"uuid": "5a45276c-0182-4849-b51e-fdcc3bb69946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32965", "type": "seen", "source": "https://t.me/cyberbannews_ir/16507", "content": "\ud83e\ude99 \u062d\u0645\u0644\u0647\u200c\u06cc \u0632\u0646\u062c\u06cc\u0631\u0647\u200c\u06cc \u062a\u0623\u0645\u06cc\u0646 \u0628\u0647 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647\u200c\u06cc xrpl.js\n\n\ud83d\udd3a\u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647\u200c\u06cc xrpl.js \u06cc\u06a9 \u0627\u0628\u0632\u0627\u0631 \u0645\u062a\u0646\u200c\u0628\u0627\u0632 \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632 \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627\u06cc \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 XRP\u060c \u0627\u0632 \u062c\u0645\u0644\u0647 \u06a9\u06cc\u0641 \u067e\u0648\u0644\u200c\u0647\u0627\u06cc \u0631\u0645\u0632\u0627\u0631\u0632\u060c \u0635\u0631\u0627\u0641\u06cc\u200c\u0647\u0627 \u0648 \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u063a\u06cc\u0631\u0645\u062a\u0645\u0631\u06a9\u0632\u060c \u06a9\u0627\u0631\u0628\u0631\u062f \u06af\u0633\u062a\u0631\u062f\u0647\u200c\u0627\u06cc \u062f\u0627\u0631\u062f.\n\n\ud83d\udd3b\u062f\u0631 \u06cc\u06a9\u06cc \u0627\u0632 \u062d\u0645\u0644\u0627\u062a \u0632\u0646\u062c\u06cc\u0631\u0647\u200c\u06cc \u062a\u0623\u0645\u06cc\u0646\u060c \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0631\u0633\u0645\u06cc \u0627\u06cc\u0646 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647 \u0645\u0648\u0631\u062f \u0646\u0641\u0648\u0630 \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0648 \u0628\u0647 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u0622\u0644\u0648\u062f\u0647 \u0634\u062f\u0647\u200c\u0627\u0646\u062f.\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u0646\u0627\u0633\u0647\u200c\u06cc CVE-2025-32965 \u0648 \u0634\u062f\u062a 9.3 \u062f\u0631 \u062a\u0627\u0631\u06cc\u062e 22 \u0622\u0648\u0631\u06cc\u0644 2025 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u06af\u0631\u062f\u06cc\u062f \u06a9\u0647 \u0645\u0646\u062c\u0631 \u0628\u0647 \u0633\u0631\u0642\u062a \u06a9\u0644\u06cc\u062f\u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0648 \u062a\u0648\u0633\u0639\u0647\u200c\u062f\u0647\u0646\u062f\u06af\u0627\u0646 \u0645\u06cc\u200c\u0634\u062f.\n\n\u2764\ufe0f \u06af\u0632\u0627\u0631\u0634 \u06a9\u0627\u0645\u0644\n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc #\u0633\u0631\u0642\u062a_\u062f\u0627\u062f\u0647 #\u0647\u06a9\n\n\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\n\ud83d\udd39\ud83d\udd39 @cyberbannews_ir", "creation_timestamp": "2025-04-30T06:35:23.000000Z"}, {"uuid": "785e9043-46c9-4b85-9d0e-1a9d9130af3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3296", "type": "seen", "source": "https://t.me/cvedetector/22186", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3296 - SourceCodester Online Eyewear Shop SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3296 \nPublished : April 5, 2025, 8:15 a.m. | 29\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in SourceCodester Online Eyewear Shop 1.0. This issue affects some unknown processing of the file /classes/Users.php?f=delete_customer. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-05T11:34:35.000000Z"}]}