{"vulnerability": "CVE-2025-43926", "sightings": [{"uuid": "790e3ebf-23c0-441c-9748-06dd0553b846", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43926", "type": "seen", "source": "https://t.me/cvedetector/24829", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43926 - Znuny Unauthenticated User Preference Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43926 \nPublished : May 8, 2025, 4:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : An issue was discovered in Znuny through 6.5.14 and 7.x through 7.1.6. Custom AJAX calls to the AgentPreferences UpdateAJAX subaction can be used to set user preferences with arbitrary keys. When fetching user data via GetUserData, these keys and values are retrieved and given as a whole to other function calls, which then might use these keys/values to affect permissions or other settings. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T20:07:33.000000Z"}, {"uuid": "a30bcb87-abbd-427f-80eb-24005a6c4e92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43926", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loodjhyt7qa2", "content": "", "creation_timestamp": "2025-05-08T16:48:47.383888Z"}]}