{"vulnerability": "CVE-2025-42605", "sightings": [{"uuid": "61800bda-7d57-4fbc-a37d-542e0b565230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42605", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13021", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-42605\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: This vulnerability exists in Meon Bidding Solutions due to improper authorization controls on certain API endpoints for the initiation, modification, or cancellation operations. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body to gain unauthorized access to other user accounts.\n\nSuccessful exploitation of this vulnerability could allow remote attacker to perform authorized manipulation of data associated with other user accounts.\n\ud83d\udccf Published: 2025-04-23T10:51:00.255Z\n\ud83d\udccf Modified: 2025-04-23T10:51:00.255Z\n\ud83d\udd17 References:\n1. https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&amp;VLCODE=CIVN-2025-0082", "creation_timestamp": "2025-04-23T11:20:44.000000Z"}, {"uuid": "b51d90af-e19d-4b1e-8b67-c27143b7f32e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42605", "type": "seen", "source": "https://t.me/cvedetector/23584", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-42605 - Meon Bidding Solutions Remote Authorization Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-42605 \nPublished : April 23, 2025, 11:15 a.m. | 57\u00a0minutes ago \nDescription : This vulnerability exists in Meon Bidding Solutions due to improper authorization controls on certain API endpoints for the initiation, modification, or cancellation operations. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body to gain unauthorized access to other user accounts.  \n  \nSuccessful exploitation of this vulnerability could allow remote attacker to perform authorized manipulation of data associated with other user accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T14:28:53.000000Z"}, {"uuid": "0a30e122-615b-4cd8-94ad-c29f3245d259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42605", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnibm47sxu2g", "content": "", "creation_timestamp": "2025-04-23T13:15:16.120206Z"}]}