{"vulnerability": "CVE-2025-5270", "sightings": [{"uuid": "89a9efb6-688d-45bc-8d71-6c416ab2cbc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52708", "type": "seen", "source": "Telegram/AEB12iQ2dPbaMPDGvzsrZhLVTqEGR_7XpBf0du0psDHp5E4", "content": "", "creation_timestamp": "2025-06-20T16:17:37.000000Z"}, {"uuid": "98e35ce1-13ce-4e9c-8ab2-a3e0e4c09a7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5270", "type": "seen", "source": "Telegram/-4PWKdGh7Kpc-vvJk6vK7n8-GZuzIns0GyCgpAoav3Hmtmk", "content": "", "creation_timestamp": "2026-04-13T17:55:48.000000Z"}, {"uuid": "187fee29-554a-45b0-aa9a-033743d48dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5270", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17623", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5270\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In certain cases, SNI could have been sent unencrypted even when encrypted DNS was enabled. This vulnerability affects Firefox &lt; 139.\n\ud83d\udccf Published: 2025-05-27T12:29:28.612Z\n\ud83d\udccf Modified: 2025-05-27T12:29:28.612Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1910298\n2. https://www.mozilla.org/security/advisories/mfsa2025-42/", "creation_timestamp": "2025-05-27T12:48:43.000000Z"}, {"uuid": "2be7a9c7-5c2d-49ed-8d34-eec565caf80c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52708", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19216", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52708\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RealMag777 HUSKY allows PHP Local File Inclusion. This issue affects HUSKY: from n/a through 1.3.7.\n\ud83d\udccf Published: 2025-06-20T15:03:34.933Z\n\ud83d\udccf Modified: 2025-06-23T16:23:25.773Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/woocommerce-products-filter/vulnerability/wordpress-husky-plugin-1-3-7-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-06-23T16:47:02.000000Z"}, {"uuid": "99d342d4-2a00-4d41-8b97-e86059c22aa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52707", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19215", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52707\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FirelightWP Firelight Lightbox allows Stored XSS. This issue affects Firelight Lightbox: from n/a through 2.3.16.\n\ud83d\udccf Published: 2025-06-20T15:03:34.270Z\n\ud83d\udccf Modified: 2025-06-23T16:23:31.596Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/easy-fancybox/vulnerability/wordpress-firelight-lightbox-plugin-2-3-16-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-06-23T16:47:01.000000Z"}, {"uuid": "f106b3f1-9ddf-4b05-a2fd-658bcd3781cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5270", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq5rf6rzkmm2", "content": "", "creation_timestamp": "2025-05-27T13:16:29.921884Z"}, {"uuid": "06dc3219-695b-487b-9ce5-13a61fb251aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52709", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19725", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52709\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Deserialization of Untrusted Data vulnerability in wpeverest Everest Forms allows Object Injection. This issue affects Everest Forms: from n/a through 3.2.2.\n\ud83d\udccf Published: 2025-06-27T11:52:29.065Z\n\ud83d\udccf Modified: 2025-06-27T14:47:20.647Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/everest-forms/vulnerability/wordpress-everest-forms-3-2-2-php-object-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-06-27T14:51:28.000000Z"}]}