{"vulnerability": "CVE-2025-3815", "sightings": [{"uuid": "c850e287-5ddd-4c12-8010-d9987c11742b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3815", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lob3ol5a3z2e", "content": "", "creation_timestamp": "2025-05-03T10:05:46.671995Z"}, {"uuid": "5ae15de8-20da-4374-9816-42a019b581db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3815", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loau5w2czp72", "content": "", "creation_timestamp": "2025-05-03T12:39:58.116048Z"}, {"uuid": "cd53adb4-c9bd-4675-85d4-aeec673bfdf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38158", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lt2lg3apyu2u", "content": "", "creation_timestamp": "2025-07-03T11:04:41.315922Z"}, {"uuid": "9b099079-0513-464b-9be4-4d7091c360b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38159", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0398/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "93da42ea-3a78-4113-bc27-c1d00f80c379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38152", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12404", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38152\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: core: Clear table_sz when rproc_shutdown\n\nThere is case as below could trigger kernel dump:\nUse U-Boot to start remote processor(rproc) with resource table\npublished to a fixed address by rproc. After Kernel boots up,\nstop the rproc, load a new firmware which doesn't have resource table\n,and start rproc.\n\nWhen starting rproc with a firmware not have resource table,\n`memcpy(loaded_table, rproc-&gt;cached_table, rproc-&gt;table_sz)` will\ntrigger dump, because rproc-&gt;cache_table is set to NULL during the last\nstop operation, but rproc-&gt;table_sz is still valid.\n\nThis issue is found on i.MX8MP and i.MX9.\n\nDump as below:\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000000\nMem abort info:\n  ESR = 0x0000000096000004\n  EC = 0x25: DABT (current EL), IL = 32 bits\n  SET = 0, FnV = 0\n  EA = 0, S1PTW = 0\n  FSC = 0x04: level 0 translation fault\nData abort info:\n  ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n  CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=000000010af63000\n[0000000000000000] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 0000000096000004 [#1] PREEMPT SMP\nModules linked in:\nCPU: 2 UID: 0 PID: 1060 Comm: sh Not tainted 6.14.0-rc7-next-20250317-dirty #38\nHardware name: NXP i.MX8MPlus EVK board (DT)\npstate: a0000005 (NzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : __pi_memcpy_generic+0x110/0x22c\nlr : rproc_start+0x88/0x1e0\nCall trace:\n __pi_memcpy_generic+0x110/0x22c (P)\n rproc_boot+0x198/0x57c\n state_store+0x40/0x104\n dev_attr_store+0x18/0x2c\n sysfs_kf_write+0x7c/0x94\n kernfs_fop_write_iter+0x120/0x1cc\n vfs_write+0x240/0x378\n ksys_write+0x70/0x108\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x48/0x10c\n el0_svc_common.constprop.0+0xc0/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x30/0xcc\n el0t_64_sync_handler+0x10c/0x138\n el0t_64_sync+0x198/0x19c\n\nClear rproc-&gt;table_sz to address the issue.\n\ud83d\udccf Published: 2025-04-18T07:01:31.714Z\n\ud83d\udccf Modified: 2025-04-18T07:01:31.714Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6e66bca8cd51ebedd5d32426906a38e4a3c69c5f\n2. https://git.kernel.org/stable/c/e6015ca453b82ec54aec9682dcc38773948fcc48\n3. https://git.kernel.org/stable/c/7c6bb82a6f3da6ab2d3fbea03901482231708b98\n4. https://git.kernel.org/stable/c/2df19f5f6f72da6f6ebab7cdb3a3b9f7686bb476\n5. https://git.kernel.org/stable/c/8e0fd2a3b9852ac3cf540edb06ccc0153b38b5af\n6. https://git.kernel.org/stable/c/068f6648ff5b0c7adeb6c363fae7fb188aa178fa\n7. https://git.kernel.org/stable/c/efdde3d73ab25cef4ff2d06783b0aad8b093c0e4", "creation_timestamp": "2025-04-18T07:59:20.000000Z"}, {"uuid": "7ff60d99-ad67-4100-afec-8b73906e79d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38157", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lt2m2z73bp2o", "content": "", "creation_timestamp": "2025-07-03T11:16:23.827306Z"}, {"uuid": "eab4afec-79a4-4a7f-b32d-b9617d5e02d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38159", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lt2mgebcmc2s", "content": "", "creation_timestamp": "2025-07-03T11:22:44.515464Z"}, {"uuid": "4dfd3563-8915-4cd9-b993-1f514cc45974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-38154", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mgff4w63em24", "content": "", "creation_timestamp": "2026-03-06T13:10:10.259810Z"}, {"uuid": "9400f15c-868a-4f8d-934c-d18406503e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38159", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "7e64743e-cec2-4abe-b195-a46423a63da3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3815", "type": "seen", "source": "https://t.me/cvedetector/24395", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3815 - WordPress SurveyJS Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-3815 \nPublished : May 3, 2025, 8:15 a.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : The SurveyJS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 1.12.32 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-03T12:01:32.000000Z"}, {"uuid": "5946340d-dbf9-4420-bb3e-131611b7a120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-38154", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mi2fvy5bw326", "content": "", "creation_timestamp": "2026-03-27T15:15:16.837006Z"}, {"uuid": "7253336d-d7d8-4d89-b75b-dd1593fd5781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-38154", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3miltukybcz26", "content": "", "creation_timestamp": "2026-04-03T13:40:17.436783Z"}, {"uuid": "ca946cc3-82d0-4ca5-94e0-62a123531bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38154", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/redhat-linux-kernel-multiple-vulnerabilities_20260401", "content": "", "creation_timestamp": "2026-03-31T20:00:00.000000Z"}, {"uuid": "c4073d40-1256-4a55-b78b-a4528c1140f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38154", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0396/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "d4521751-a0b9-42ee-8837-d137529b296a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3815", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14690", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3815\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The SurveyJS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 1.12.32 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-05-03T07:22:57.130Z\n\ud83d\udccf Modified: 2025-05-03T07:22:57.130Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/c4285590-9c2f-4189-8b47-09378d8a2432?source=cve\n2. https://plugins.trac.wordpress.org/browser/surveyjs/trunk/initializer.php#L165\n3. https://surveyjs.io/stay-updated/release-notes\n4. https://github.com/surveyjs/surveyjs-wordpress\n5. https://github.com/surveyjs/surveyjs-wordpress/commit/6c332319c82c32d7148f77ed7ee20a9c6a5dc179", "creation_timestamp": "2025-05-03T08:16:33.000000Z"}]}