{"vulnerability": "GHSA-7XQ5-54JP-2MFG", "sightings": [{"uuid": "b3f0d202-8b2a-4d25-a2f9-a4b06564fa29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-7xq5-54jp-2mfg", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114360879207101550", "content": "", "creation_timestamp": "2025-04-18T20:35:33.415648Z"}, {"uuid": "3d85f5d7-2b2d-41bb-b48e-c6fc59dca020", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-7XQ5-54JP-2MFG", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12542", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32377\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Rasa Pro is a framework for building scalable, dynamic conversational AI assistants that integrate large language models (LLMs). A vulnerability has been identified in Rasa Pro where voice connectors in Rasa Pro do not properly implement authentication even when a token is configured in the credentials.yml file. This could allow an attacker to submit voice data to the Rasa Pro assistant from an unauthenticated source. This issue has been patched for audiocodes, audiocodes_stream, and genesys connectors in versions 3.9.20, 3.10.19, 3.11.7 and 3.12.6.\n\ud83d\udccf Published: 2025-04-18T19:59:32.286Z\n\ud83d\udccf Modified: 2025-04-18T20:35:41.744Z\n\ud83d\udd17 References:\n1. https://github.com/RasaHQ/security-advisories/security/advisories/GHSA-7xq5-54jp-2mfg", "creation_timestamp": "2025-04-18T20:59:25.000000Z"}]}