{"vulnerability": "cve-2025-2238", "sightings": [{"uuid": "913aae65-8d60-4618-881c-e58ab09cd759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22383", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767634090843012", "content": "", "creation_timestamp": "2025-01-04T02:05:31.286438Z"}, {"uuid": "f7085c6b-295f-4dd5-ba98-2b1e051f3f14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22385", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767634120870280", "content": "", "creation_timestamp": "2025-01-04T02:05:31.872702Z"}, {"uuid": "84cdab65-f5bc-417b-a587-80ca0341b135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22386", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767634135345297", "content": "", "creation_timestamp": "2025-01-04T02:05:32.280817Z"}, {"uuid": "a95a2e2b-dd00-4632-86e5-cf375e7e7fe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22384", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767634106260588", "content": "", "creation_timestamp": "2025-01-04T02:05:33.981048Z"}, {"uuid": "9cce6f26-0088-404a-89f4-d65522fc56c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22384", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767647032289908", "content": "", "creation_timestamp": "2025-01-04T02:08:49.174701Z"}, {"uuid": "45863d3d-fb61-437c-801f-5dccda309000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22386", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767647062329384", "content": "", "creation_timestamp": "2025-01-04T02:08:49.484964Z"}, {"uuid": "e6b3c011-16cf-4224-a79a-6cb0a04cb2f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22383", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767647016420013", "content": "", "creation_timestamp": "2025-01-04T02:08:50.015007Z"}, {"uuid": "f037b141-6fa0-424e-b8e1-4410ef809be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22385", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767647047511984", "content": "", "creation_timestamp": "2025-01-04T02:08:50.717935Z"}, {"uuid": "1359bba0-16d4-438a-8ab3-5387efd14b80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22389", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767706105935055", "content": "", "creation_timestamp": "2025-01-04T02:23:55.390879Z"}, {"uuid": "4d2ff0db-ac5c-4fcb-a869-2da309277c1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22388", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767706092106443", "content": "", "creation_timestamp": "2025-01-04T02:23:56.530735Z"}, {"uuid": "60e64641-10ea-4d4e-8a77-dc012d5692d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22387", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113767706077728976", "content": "", "creation_timestamp": "2025-01-04T02:23:56.613098Z"}, {"uuid": "776f50c4-589b-4bdf-afd4-4fa319cccaed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22381", "type": "seen", "source": "https://gist.github.com/Darkcrai86/847bbde61f019b66274c116c69f7bec6", "content": "", "creation_timestamp": "2025-10-16T18:07:37.000000Z"}, {"uuid": "1e2a655a-04cd-4ac4-bda2-6e28ddc7789b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2238", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13386", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2238\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Vikinger theme for WordPress is vulnerable to privilege in all versions up to, and including, 1.9.30. This is due to insufficient user_meta restrictions in the 'vikinger_user_meta_update_ajax' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate their privileges to Administrator-level.\n\ud83d\udccf Published: 2025-04-25T06:45:28.836Z\n\ud83d\udccf Modified: 2025-04-25T06:45:28.836Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/9e0cba5b-5833-4c02-ac17-830994b0f207?source=cve\n2. https://themeforest.net/item/vikinger-buddypress-and-gamipress-social-community/28612259", "creation_timestamp": "2025-04-25T07:07:13.000000Z"}, {"uuid": "138e9c7d-761d-4d6c-b4c1-57a868aefdde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22389", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3948", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22389\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-04T02:15:07.600\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://support.optimizely.com/hc/en-us/articles/33182404079629-Content-Management-System-CMS-Security-Advisory-CMS-2025-03", "creation_timestamp": "2025-02-11T23:11:57.000000Z"}, {"uuid": "dfa56ea5-2311-4d47-bc3b-d9175cf04f83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22384", "type": "seen", "source": "https://t.me/cvedetector/14259", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22384 - Optimizely Configured Commerce Storefront Product Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22384 \nPublished : Jan. 4, 2025, 2:15 a.m. | 28\u00a0minutes ago \nDescription : An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue concerning business logic exists in the Commerce B2B application, which allows storefront visitors to purchase discontinued products in specific scenarios where requests are altered before reaching the server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T03:53:19.000000Z"}, {"uuid": "ce4ca6d3-5b27-47b7-af97-85dfc4c2bef0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22383", "type": "seen", "source": "https://t.me/cvedetector/14258", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22383 - Optimizely Configured Commerce Email Markup Injection\", \n  \"Content\": \"CVE ID : CVE-2025-22383 \nPublished : Jan. 4, 2025, 2:15 a.m. | 28\u00a0minutes ago \nDescription : An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity input validation issue exists in the Commerce B2B application, affecting the Contact Us functionality. This allows visitors to send e-mail messages that could contain unfiltered HTML markup in specific scenarios. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T03:53:18.000000Z"}, {"uuid": "9e5f02aa-c603-4b78-87e0-f11b7946488c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22389", "type": "seen", "source": "https://t.me/cvedetector/14256", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22389 - Optimizely EPiServer CMS File Upload Vulnerability - Remote File Execution\", \n  \"Content\": \"CVE ID : CVE-2025-22389 \nPublished : Jan. 4, 2025, 2:15 a.m. | 28\u00a0minutes ago \nDescription : An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T03:53:14.000000Z"}, {"uuid": "3b2360a9-34c7-40d4-9bd6-9ff1be5ff81d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2238", "type": "seen", "source": "https://t.me/cvedetector/23744", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2238 - Vikinger WordPress Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2238 \nPublished : April 25, 2025, 7:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : The Vikinger theme for WordPress is vulnerable to privilege in all versions up to, and including, 1.9.30. This is due to insufficient user_meta restrictions in the 'vikinger_user_meta_update_ajax' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate their privileges to Administrator-level. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T10:49:39.000000Z"}, {"uuid": "3ce912a2-42a6-44d0-8b76-f57b5b8825eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2238", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnmnxvjn6m52", "content": "", "creation_timestamp": "2025-04-25T07:07:36.162674Z"}, {"uuid": "09eed65a-f29c-47c1-8606-e87cee7f560d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2238", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnms2mesjr2v", "content": "", "creation_timestamp": "2025-04-25T08:20:18.849700Z"}, {"uuid": "26c64790-eedd-4907-8c1a-273f7631d6d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2238", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114397971292300306", "content": "", "creation_timestamp": "2025-04-25T09:48:34.225071Z"}, {"uuid": "26704974-8447-495c-8679-bb258c9908ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22383", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/169", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-79xq-2cpc-pjfm\n\ud83d\udd17 Aliases: CVE-2025-22383\n\ud83d\udd39 Details: An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity input validation issue exists in the Commerce B2B application, affecting the Contact Us functionality. This allows visitors to send e-mail messages that could contain unfiltered HTML markup in specific scenarios.\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T15:30:59Z\n\ud83d\uddd3\ufe0f Published: 2025-01-04T03:33:08Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-79\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-22383\n2. https://support.optimizely.com/hc/en-us/articles/32694923652493-Configured-Commerce-Security-Advisory-COM-2024-03", "creation_timestamp": "2025-01-06T15:37:32.000000Z"}, {"uuid": "dbef145c-b27a-4aee-8ff9-48b28a1dedd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22388", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/171", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-52qc-q82v-p8hj\n\ud83d\udd17 Aliases: CVE-2025-22388\n\ud83d\udd39 Details: An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads.\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T15:30:59Z\n\ud83d\uddd3\ufe0f Published: 2025-01-04T03:33:08Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-79\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-22388\n2. https://support.optimizely.com/hc/en-us/articles/331820426055-Content-Management-System-CMS-Security-Advisory-CMS-2025-01", "creation_timestamp": "2025-01-06T15:37:52.000000Z"}, {"uuid": "19fcc6df-dcf4-4d20-b32c-15660bf9508f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22388", "type": "seen", "source": "https://t.me/cvedetector/14255", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22388 - Optimizely EPiServer.CMS.Core Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22388 \nPublished : Jan. 4, 2025, 2:15 a.m. | 28\u00a0minutes ago \nDescription : An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T03:53:13.000000Z"}, {"uuid": "a50b564f-01df-4cc3-95b1-f7020033c635", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22387", "type": "seen", "source": "https://t.me/cvedetector/14254", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22387 - Optimizely Configured Commerce Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22387 \nPublished : Jan. 4, 2025, 2:15 a.m. | 28\u00a0minutes ago \nDescription : An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T03:53:12.000000Z"}, {"uuid": "f3727c34-c0b5-429a-9119-44139d43aa83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22386", "type": "seen", "source": "https://t.me/cvedetector/14253", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22386 - Optimizely Configured Commerce Session Token Tampering\", \n  \"Content\": \"CVE ID : CVE-2025-22386 \nPublished : Jan. 4, 2025, 2:15 a.m. | 28\u00a0minutes ago \nDescription : An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T03:53:12.000000Z"}, {"uuid": "441cd374-bb38-4e70-ac5c-17311619bd73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22385", "type": "seen", "source": "https://t.me/cvedetector/14252", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22385 - Optimizely Configured Commerce Unconfirmed Account Creation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22385 \nPublished : Jan. 4, 2025, 2:15 a.m. | 28\u00a0minutes ago \nDescription : An issue was discovered in Optimizely Configured Commerce before 5.2.2408. For newly created accounts, the Commerce B2B application does not require email confirmation. This medium-severity issue allows the mass creation of accounts. This could affect database storage; also, non-requested storefront accounts can be created on behalf of visitors. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T03:53:11.000000Z"}, {"uuid": "5ca3f8cd-d6c3-4a52-8619-a4b6f5d0c822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2238", "type": "published-proof-of-concept", "source": "Telegram/h03BTlMVhsmhX6D7e2vIwa5HqRH7sazB1QZ_U1Au3scT3K4", "content": "", "creation_timestamp": "2025-04-25T10:01:15.000000Z"}]}