{"vulnerability": "CVE-2025-3691", "sightings": [{"uuid": "6cf54161-4460-4707-9685-d02b44fcc973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3691", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwtcdbm7e2g", "content": "", "creation_timestamp": "2025-04-16T14:44:05.089039Z"}, {"uuid": "efe81294-719c-4c27-8e06-b1becdf71baa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://gist.github.com/maurcarvalho/16425d35aa386d27fdecc74187e5aa85", "content": "", "creation_timestamp": "2026-02-17T18:06:42.000000Z"}, {"uuid": "624eb485-ca69-44fa-b764-1916c7f2cf0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115904785266048221", "content": "", "creation_timestamp": "2026-01-16T12:31:10.250958Z"}, {"uuid": "27afc851-10cd-441f-84a0-57e33de2fd67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://threatintel.cc/2026/01/16/whisperpair-attack-leaves-millions-of.html", "content": "", "creation_timestamp": "2026-01-16T11:31:16.000000Z"}, {"uuid": "abd081a3-5441-4219-a6e6-fed5711ed65b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-36911", "type": "seen", "source": "https://bsky.app/profile/cyberveille-ch.bsky.social/post/3mcnwg6lxcf2x", "content": "", "creation_timestamp": "2026-01-18T01:00:05.724844Z"}, {"uuid": "cc143c4e-67ad-4631-9567-565b2b9c9f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3mcq7isepws26", "content": "", "creation_timestamp": "2026-01-18T22:47:59.489696Z"}, {"uuid": "18422f08-c347-4b6c-a54d-d8b06e1371ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-36911", "type": "seen", "source": "https://bsky.app/profile/buchikuma.bsky.social/post/3mcrizk7nrg2z", "content": "", "creation_timestamp": "2026-01-19T11:11:07.638081Z"}, {"uuid": "323c31b2-3ffa-44c8-b8fc-21788e23c4b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3mctkcyqo262p", "content": "", "creation_timestamp": "2026-01-20T06:39:32.406781Z"}, {"uuid": "bef7f8fc-b2c8-40a7-ad61-f7d3f9be0b11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/zcat-app.bsky.social/post/3mcykxlb67k2p", "content": "", "creation_timestamp": "2026-01-22T06:34:24.943642Z"}, {"uuid": "412189f5-dbab-4342-9075-4e94ddc8d5c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/lalgorisme.bsky.social/post/3mciblg6qh224", "content": "", "creation_timestamp": "2026-01-15T19:03:55.037558Z"}, {"uuid": "98aa4b2b-39a9-4150-9565-4f5f71253954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/lalgorisme.bsky.social/post/3mciblg6zac24", "content": "", "creation_timestamp": "2026-01-15T19:03:55.532159Z"}, {"uuid": "83cda8d9-089f-499f-8777-049080d92b01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/lalgorisme.bsky.social/post/3mciblg6zad24", "content": "", "creation_timestamp": "2026-01-15T19:03:56.042852Z"}, {"uuid": "cca0e538-832f-4f69-bc9f-a71cc13fcd7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/lalgorisme.bsky.social/post/3mciblg727l24", "content": "", "creation_timestamp": "2026-01-15T19:03:56.515569Z"}, {"uuid": "d240636c-efe7-4236-a5b6-527c10208982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3mcu6plng5i2o", "content": "", "creation_timestamp": "2026-01-20T12:44:29.626263Z"}, {"uuid": "6c489f46-d44b-4672-b824-b4522117c71c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/115929772259895287", "content": "", "creation_timestamp": "2026-01-20T22:25:43.293678Z"}, {"uuid": "7e0e5646-4be2-4f8f-9f28-f922e988b3ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/cryptrz.bsky.social/post/3md5xmyxdvc22", "content": "", "creation_timestamp": "2026-01-24T10:04:29.198907Z"}, {"uuid": "c3ffc7bf-3894-492f-a8fc-b3f57bfc7918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/cryptrz.infosec.exchange.ap.brid.gy/post/3md5xpyhjbah2", "content": "", "creation_timestamp": "2026-01-24T10:08:49.638583Z"}, {"uuid": "ce2033be-cdc1-4b87-9b36-f310dfaff541", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/penthertz.bsky.social/post/3mdfsvryvbm2e", "content": "", "creation_timestamp": "2026-01-27T13:01:09.687960Z"}, {"uuid": "93e55e82-3c1c-4f57-ab0a-fcbc9ee176e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-36911", "type": "seen", "source": "https://bsky.app/profile/cyberveille-ch.bsky.social/post/3mdq3g6zhxd2x", "content": "", "creation_timestamp": "2026-01-31T15:00:05.860794Z"}, {"uuid": "f5674c9c-9e5b-4d6d-b5b9-bbfbfe92a135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-36911", "type": "seen", "source": "https://bsky.app/profile/tom-doerr.bsky.social/post/3mgbsajdwxh22", "content": "", "creation_timestamp": "2026-03-05T02:54:10.956598Z"}, {"uuid": "b3c2adb1-c3f7-4bcf-acf6-5a022e60d6d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3691", "type": "seen", "source": "https://t.me/cvedetector/23089", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3691 - Mirweiye Seven Bears Library CMS SSRF\", \n  \"Content\": \"CVE ID : CVE-2025-3691 \nPublished : April 16, 2025, 1:15 p.m. | 18\u00a0minutes ago \nDescription : A vulnerability was found in mirweiye Seven Bears Library CMS 2023. It has been classified as problematic. Affected is an unknown function of the component Add Link Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T16:02:43.000000Z"}]}