{"vulnerability": "cve-2025-1726", "sightings": [{"uuid": "b637c6d9-add5-44af-9144-8edf918e168e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1726", "type": "seen", "source": "https://t.me/cvedetector/18959", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1726 - Esri ArcGIS Monitor SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-1726 \nPublished : Feb. 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : There is a SQL injection issue\u00a0in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is \"LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-26T21:48:49.000000Z"}, {"uuid": "f830eec9-ccd6-44d5-827f-31f72cf769d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1726", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5604", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1726\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: There is a SQL injection issue\u00a0in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is \"LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1.\n\ud83d\udccf Published: 2025-02-26T19:28:51.480Z\n\ud83d\udccf Modified: 2025-02-26T19:28:51.480Z\n\ud83d\udd17 References:\n1. https://www.esri.com/arcgis-blog/products/monitor/administration/whats-new-in-arcgis-monitor-2024-1/", "creation_timestamp": "2025-02-26T20:25:01.000000Z"}]}