{"vulnerability": "cve-2025-1687", "sightings": [{"uuid": "0bccf574-6e98-49c6-89f4-548b5f6f4bb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1687", "type": "seen", "source": "https://t.me/cvedetector/19106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1687 - Cardealer WordPress Cross-Site Request Forgery Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1687 \nPublished : Feb. 28, 2025, 12:15 a.m. | 1\u00a0hour, 42\u00a0minutes ago \nDescription : The Cardealer theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.4. This is due to missing nonce validation on the 'update_user_profile' function. This makes it possible for unauthenticated attackers to update the user email and password via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T03:38:47.000000Z"}, {"uuid": "a3e2ae4d-8dd8-4050-b0e2-ed24d6408d0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1687", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1687\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Cardealer theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.4. This is due to missing nonce validation on the 'update_user_profile' function. This makes it possible for unauthenticated attackers to update the user email and password via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-02-27T23:22:39.776Z\n\ud83d\udccf Modified: 2025-02-27T23:22:39.776Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/6305b7be-8651-4028-a8cf-ea58b4977225?source=cve\n2. https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708\n3. https://webtemplatemasters.com/cardealer/changelog/#v165", "creation_timestamp": "2025-02-28T00:25:54.000000Z"}, {"uuid": "43bfa1cf-443e-4104-8a3b-99474ead9edb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1687", "type": "seen", "source": "Telegram/6_7okO1NngkfJQC9f1jWb9Srwt-hW1Jgv3j45-pHpzfyCMt0", "content": "", "creation_timestamp": "2025-03-02T11:44:21.000000Z"}, {"uuid": "782f11af-27a2-4640-af54-17b0bd482ed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1687", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114078994955411295", "content": "", "creation_timestamp": "2025-02-28T01:48:41.846006Z"}]}