{"vulnerability": "CVE-2025-4530", "sightings": [{"uuid": "da9787b3-41be-4d26-8f56-04470fc933dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4530", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15920", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4530\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in feng_ha_ha/megagao ssm-erp and production_ssm 1.0. It has been declared as problematic. Affected by this vulnerability is the function handleFileDownload of the file FileController.java of the component File Handler. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product is distributed under two entirely different names.\n\ud83d\udccf Published: 2025-05-11T05:00:06.212Z\n\ud83d\udccf Modified: 2025-05-11T05:00:06.212Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.308275\n2. https://vuldb.com/?ctiid.308275\n3. https://vuldb.com/?submit.565380\n4. https://github.com/Hao-Ni/CVE/issues/2", "creation_timestamp": "2025-05-11T05:28:20.000000Z"}, {"uuid": "6565b1aa-362f-4ef7-b3f7-d1ab5abd99aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4530", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lov2hg6ti72t", "content": "", "creation_timestamp": "2025-05-11T08:37:07.772448Z"}, {"uuid": "e1fdfdea-39f3-4051-bbcc-115bff4eecc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4530", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lourjqa6yhc2", "content": "", "creation_timestamp": "2025-05-11T10:06:15.160813Z"}, {"uuid": "7cc5fa69-637f-4b62-9393-5a643b037233", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4530", "type": "seen", "source": "https://t.me/cvedetector/25039", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4530 - Feng Ha Ha Megagao SSM-ERP/Production SSM Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4530 \nPublished : May 11, 2025, 5:15 a.m. | 2\u00a0hours ago \nDescription : A vulnerability was found in feng_ha_ha/megagao ssm-erp and production_ssm 1.0. It has been declared as problematic. Affected by this vulnerability is the function handleFileDownload of the file FileController.java of the component File Handler. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product is distributed under two entirely different names. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-11T10:00:39.000000Z"}]}