{"vulnerability": "CVE-2025-3959", "sightings": [{"uuid": "6cdb8be9-b1a5-4a29-a39d-a194b0d28d88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39594", "type": "seen", "source": "https://t.me/cvedetector/23258", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39594 - Bob Arigato Autoresponder and Newsletter Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-39594 \nPublished : April 17, 2025, 4:15 p.m. | 2\u00a0hours, 6\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bob Arigato Autoresponder and Newsletter allows Reflected XSS. This issue affects Arigato Autoresponder and Newsletter: from n/a through 2.7.2.4. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T20:30:31.000000Z"}, {"uuid": "48fed381-c824-42e3-bfa3-ec6e12eaad44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://t.me/cvedetector/23255", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39596 - Quentn.com GmbH Quentn WP Weak Authentication Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-39596 \nPublished : April 17, 2025, 4:15 p.m. | 2\u00a0hours, 6\u00a0minutes ago \nDescription : Weak Authentication vulnerability in Quentn.com GmbH Quentn WP allows Privilege Escalation. This issue affects Quentn WP: from n/a through 1.2.8. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T20:30:28.000000Z"}, {"uuid": "306fd783-ac29-4093-af5a-40097915e24f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39595", "type": "seen", "source": "https://t.me/cvedetector/23254", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39595 - Quentn WP SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-39595 \nPublished : April 17, 2025, 4:15 p.m. | 2\u00a0hours, 6\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Quentn.com GmbH Quentn WP allows SQL Injection. This issue affects Quentn WP: from n/a through 1.2.8. \nSeverity: 9.3 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T20:30:28.000000Z"}, {"uuid": "b85ebed5-e638-4463-8700-d4545a1e0737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3959", "type": "seen", "source": "https://t.me/cvedetector/23825", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3959 - \"Withstars Books-Management-System Cross-Site Request Forgery Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-3959 \nPublished : April 27, 2025, 5:15 a.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : A vulnerability was found in withstars Books-Management-System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /reader_delete.html. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-27T08:47:59.000000Z"}, {"uuid": "dc97c46f-797d-4c22-9a7c-afa2a653aede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39597", "type": "seen", "source": "https://t.me/cvedetector/23091", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39597 - Arthur Yarwood Fast eBay Listings Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-39597 \nPublished : April 16, 2025, 1:15 p.m. | 18\u00a0minutes ago \nDescription : URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Arthur Yarwood Fast eBay Listings allows Phishing. This issue affects Fast eBay Listings: from n/a through 2.12.15. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T16:02:45.000000Z"}, {"uuid": "c85e5726-ce1c-49c0-98fe-020dac8c0163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39593", "type": "seen", "source": "https://t.me/cvedetector/23090", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39593 - EverAccounting CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-39593 \nPublished : April 16, 2025, 1:15 p.m. | 18\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in EverAccounting Ever Accounting allows Cross Site Request Forgery. This issue affects Ever Accounting: from n/a through 2.1.5. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T16:02:44.000000Z"}, {"uuid": "e1c14600-1688-427d-aee7-60dcbd55fa1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39592", "type": "seen", "source": "https://t.me/cvedetector/23101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39592 - WP Shuffle Subscribe to Unlock Lite PHP RFI\", \n  \"Content\": \"CVE ID : CVE-2025-39592 \nPublished : April 16, 2025, 1:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Shuffle Subscribe to Unlock Lite allows PHP Local File Inclusion. This issue affects Subscribe to Unlock Lite: from n/a through 1.3.0. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T16:02:58.000000Z"}, {"uuid": "2dbaa330-6096-4c14-89e5-f8102f95e01b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39591", "type": "seen", "source": "https://t.me/cvedetector/23100", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39591 - WP Shuffle WP Subscription Forms Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-39591 \nPublished : April 16, 2025, 1:15 p.m. | 18\u00a0minutes ago \nDescription : Missing Authorization vulnerability in WP Shuffle WP Subscription Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Subscription Forms: from n/a through 1.2.3. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T16:02:57.000000Z"}, {"uuid": "c185d759-cdd0-46eb-ba4f-17e8e22f53c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39590", "type": "seen", "source": "https://t.me/cvedetector/23103", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39590 - Elementor WPDeveloper Essential Addons Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-39590 \nPublished : April 16, 2025, 1:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Addons for Elementor allows Stored XSS. This issue affects Essential Addons for Elementor: from n/a through 6.1.9. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T16:03:08.000000Z"}, {"uuid": "470bd550-782e-4510-a527-22f458789bc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3959", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnrl2zqajpu2", "content": "", "creation_timestamp": "2025-04-27T05:58:35.821553Z"}, {"uuid": "1641163c-cc7d-43d8-ae5c-b9f8e6ab08e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3959", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnrqikxtx32b", "content": "", "creation_timestamp": "2025-04-27T07:35:40.031672Z"}, {"uuid": "06d8b178-90d3-4adf-b144-cdb03f672f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "74181f4c-8a90-47f6-af1d-0750884cd5b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "06000472-97a6-4c1b-b0da-19ffbd508d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "03fd4bdc-5fc0-411a-aee5-3600b955c709", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "377abb7c-637e-426a-b58a-4213be5e0e17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "242ac6c5-e9f3-401b-9463-6782fbf24ad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39591", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12038", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-39591\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Missing Authorization vulnerability in WP Shuffle WP Subscription Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Subscription Forms: from n/a through 1.2.3.\n\ud83d\udccf Published: 2025-04-16T12:44:20.381Z\n\ud83d\udccf Modified: 2025-04-16T12:44:20.381Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-subscription-forms/vulnerability/wordpress-wp-subscription-forms-1-2-3-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-16T12:57:09.000000Z"}, {"uuid": "a4940ca9-ab96-44f2-93cc-cec2a5f4e225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39590", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-39590\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Addons for Elementor allows Stored XSS. This issue affects Essential Addons for Elementor: from n/a through 6.1.9.\n\ud83d\udccf Published: 2025-04-16T12:44:20.971Z\n\ud83d\udccf Modified: 2025-04-16T12:44:20.971Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/essential-addons-for-elementor-lite/vulnerability/wordpress-essential-addons-for-elementor-6-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-16T12:57:08.000000Z"}, {"uuid": "ae1e971b-72fa-4d60-ae42-254884c4e496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3959", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13604", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3959\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in withstars Books-Management-System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /reader_delete.html. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.\n\ud83d\udccf Published: 2025-04-27T04:31:03.597Z\n\ud83d\udccf Modified: 2025-04-27T04:31:03.597Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.306295\n2. https://vuldb.com/?ctiid.306295\n3. https://vuldb.com/?submit.557147\n4. https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/CSRF.md", "creation_timestamp": "2025-04-27T05:09:23.000000Z"}, {"uuid": "8c8a7308-2f83-4476-9940-1f66e21cafdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39599", "type": "seen", "source": "https://t.me/cvedetector/23093", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39599 - Webilia Inc. Listdom Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-39599 \nPublished : April 16, 2025, 1:15 p.m. | 18\u00a0minutes ago \nDescription : URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Webilia Inc. Listdom allows Phishing. This issue affects Listdom: from n/a through 4.0.0. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T16:02:49.000000Z"}, {"uuid": "32d59ff0-02e5-408f-9362-80503fd16fe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39598", "type": "seen", "source": "https://t.me/cvedetector/23092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-39598 - Qu\u00fd L\u00ea 91 Administrator Z Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-39598 \nPublished : April 16, 2025, 1:15 p.m. | 18\u00a0minutes ago \nDescription : Path Traversal vulnerability in Qu\u00fd L\u00ea 91 Administrator Z allows Path Traversal. This issue affects Administrator Z: from n/a through 2025.03.28. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T16:02:48.000000Z"}, {"uuid": "a5799d2a-861b-4dba-8903-e5704996f74f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39595", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114354325658038736", "content": "", "creation_timestamp": "2025-04-17T16:48:55.904019Z"}, {"uuid": "02bee0b8-5c36-4a4d-acf5-ed4dd8bd6a85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114354325715470592", "content": "", "creation_timestamp": "2025-04-17T16:48:59.522046Z"}, {"uuid": "f356f70a-9ef4-42c5-bd29-fc49cd0da7bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzq3csmwi2g", "content": "", "creation_timestamp": "2025-04-17T18:24:22.702126Z"}, {"uuid": "75523bf7-ce12-4f20-8473-ffc614699a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39595", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzq3d4lzn24", "content": "", "creation_timestamp": "2025-04-17T18:24:24.452957Z"}, {"uuid": "b61cdcee-5a3b-4bb3-a155-9f99b3035143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "8f94af53-1135-4c5e-83fb-ce157f9a514a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "1fd2986c-ebd2-4af7-8014-9a1f5d7747d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "ba3b6ed0-2506-428e-a327-dcb6418cc04f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "3276d4cc-4194-4129-9afd-106e199e29db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lzyvtr2znl2p", "content": "", "creation_timestamp": "2025-09-29T21:02:21.675420Z"}, {"uuid": "48df676c-c3ad-4ea4-9692-1be33eec695e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "33e318b5-647d-4463-a968-90881b058d7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39592", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12039", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-39592\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Shuffle Subscribe to Unlock Lite allows PHP Local File Inclusion. This issue affects Subscribe to Unlock Lite: from n/a through 1.3.0.\n\ud83d\udccf Published: 2025-04-16T12:44:19.752Z\n\ud83d\udccf Modified: 2025-04-16T12:44:19.752Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/subscribe-to-unlock-lite/vulnerability/wordpress-subscribe-to-unlock-lite-1-3-0-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-16T12:57:10.000000Z"}, {"uuid": "0bc7ec97-13b2-4384-b4c7-9ba698abb773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "published-proof-of-concept", "source": "Telegram/isVcJv5Pok2tcIFv5lgYIbrDTftuzCVH_fWB1SLg7XuiNWc", "content": "", "creation_timestamp": "2025-09-27T11:00:10.000000Z"}, {"uuid": "6c1fb1d8-2a84-4890-82fc-db43d5dbc7a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "published-proof-of-concept", "source": "Telegram/hbYy4OFSvtjQC7o8i0wINzrE4d6QF8qQ2JPnuHyOwpIrqUQ", "content": "", "creation_timestamp": "2025-09-27T21:00:04.000000Z"}, {"uuid": "56502ffd-5280-4089-8497-2aa89663daf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "published-proof-of-concept", "source": "Telegram/iE_s2wqAuT8xlw-ZjjldWH32bIYCcXYhyI8TabyOKDe-DfM", "content": "", "creation_timestamp": "2025-09-27T15:00:07.000000Z"}, {"uuid": "7d8d288a-6deb-426e-8f14-e2f7a001f9bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39590", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwtcb7q6b2c", "content": "", "creation_timestamp": "2025-04-16T14:43:54.596062Z"}, {"uuid": "55e126d3-c355-4eea-98aa-a42e5523d86f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39599", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwtcbmbqj2q", "content": "", "creation_timestamp": "2025-04-16T14:43:55.933910Z"}, {"uuid": "14170fab-1f04-4bf6-adbb-ba68981f12fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39591", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwtcbzxtd2q", "content": "", "creation_timestamp": "2025-04-16T14:43:58.282035Z"}, {"uuid": "65393f8d-c1ec-4087-ac81-f717e895c132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39593", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwtcc575k2a", "content": "", "creation_timestamp": "2025-04-16T14:43:58.851427Z"}, {"uuid": "e03c5040-df1e-4f8e-97f3-8f8072d8f071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39597", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwtcceadi24", "content": "", "creation_timestamp": "2025-04-16T14:44:00.092454Z"}, {"uuid": "ffd560a2-f55d-4eba-8bd1-1e2cbfa0f8ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39592", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwtcchmuu2i", "content": "", "creation_timestamp": "2025-04-16T14:44:00.715970Z"}, {"uuid": "45074444-e78e-4b12-bf4a-9ebc66a34f7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39598", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwtccuzmq2h", "content": "", "creation_timestamp": "2025-04-16T14:44:03.138946Z"}, {"uuid": "2b67de06-38a7-497b-a758-3bc3d715ff3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}, {"uuid": "f822e689-a545-4850-9c25-ee0d6f514daa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39596", "type": "seen", "source": "https://sploitus.com/exploit?id=D24E4AE6-D8EE-5833-BC12-E1681F02A1BA&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T05:27:24.000000Z"}]}