{"vulnerability": "CVE-2025-4812", "sightings": [{"uuid": "7293e987-ab17-4ff0-bcc3-f8806fdad8b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4812", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpd55u3jsf2h", "content": "", "creation_timestamp": "2025-05-16T23:02:44.064927Z"}, {"uuid": "0aec0729-4cdb-434e-b44f-ccaff2a8c0f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48123", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr6zugyhmf2p", "content": "", "creation_timestamp": "2025-06-09T18:43:31.426239Z"}, {"uuid": "368dd4d3-f3a6-4180-a7e6-672f4c4d0597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48125", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr7252qtzx2m", "content": "", "creation_timestamp": "2025-06-09T18:48:20.579331Z"}, {"uuid": "819c3f97-645a-4fc8-8d98-f29f4b9393de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48122", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr72bx6adr2u", "content": "", "creation_timestamp": "2025-06-09T18:51:06.003568Z"}, {"uuid": "a2a27a55-2be6-4e0c-a983-64de5aecf12e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48126", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr72hej6372s", "content": "", "creation_timestamp": "2025-06-09T18:54:07.105556Z"}, {"uuid": "cbebefd6-ead5-4857-be03-b10cbf1d31fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48129", "type": "published-proof-of-concept", "source": "Telegram/FhctTNT5vrEPprMVWlNQRJtBzJv1_3hhf0KX-wd9ahIT0cw", "content": "", "creation_timestamp": "2025-06-09T15:00:09.000000Z"}, {"uuid": "f4bfb7cf-179c-4b52-b794-b8acf8f2aa46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48128", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16727", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48128\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Missing Authorization vulnerability in Sharespine Sharespine Woocommerce Connector allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Sharespine Woocommerce Connector: from n/a through 4.7.55.\n\ud83d\udccf Published: 2025-05-16T15:45:12.066Z\n\ud83d\udccf Modified: 2025-05-16T16:50:28.265Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/sharespine-woocommerce-connector/vulnerability/wordpress-sharespine-woocommerce-connector-4-7-55-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:34:55.000000Z"}, {"uuid": "6b891f53-7f5b-4ae0-b130-dae54524407b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48127", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16726", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48127\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Missing Authorization vulnerability in App Cheap Push notification for Mobile and Web app allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Push notification for Mobile and Web app: from n/a through 2.0.3.\n\ud83d\udccf Published: 2025-05-16T15:45:11.459Z\n\ud83d\udccf Modified: 2025-05-16T16:50:35.035Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/push-notification-mobile-and-web-app/vulnerability/wordpress-push-notification-for-mobile-and-web-app-2-0-3-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:34:52.000000Z"}, {"uuid": "1a963df3-f5e1-49aa-9369-3f91dff615ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48121", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16725", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48121\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Steve Puddick WP Notes Widget allows DOM-Based XSS. This issue affects WP Notes Widget: from n/a through 1.0.6.\n\ud83d\udccf Published: 2025-05-16T15:45:10.875Z\n\ud83d\udccf Modified: 2025-05-16T16:50:41.189Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-notes-widget/vulnerability/wordpress-wp-notes-widget-1-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:34:51.000000Z"}, {"uuid": "f184ab80-166f-4baf-9931-fc48cfb8c962", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48120", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16724", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48120\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Improper Control of Generation of Code ('Code Injection') vulnerability in RomanCode MapSVG Lite allows Code Injection. This issue affects MapSVG Lite: from n/a through 8.6.4.\n\ud83d\udccf Published: 2025-05-16T15:45:10.264Z\n\ud83d\udccf Modified: 2025-05-16T16:50:49.011Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/mapsvg-lite-interactive-vector-maps/vulnerability/wordpress-mapsvg-lite-plugin-8-5-41-arbitrary-shortcode-execution-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:34:50.000000Z"}]}