{"vulnerability": "cve-2025-2267", "sightings": [{"uuid": "a3cb3b0d-f72c-47c6-b5da-3b1eda0959f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22675", "type": "seen", "source": "https://t.me/cvedetector/17216", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22675 - bPlugins Alert Box Block Stored Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-22675 \nPublished : Feb. 4, 2025, 3:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Alert Box Block \u2013 Display notice/alerts in the front end allows Stored XSS. This issue affects Alert Box Block \u2013 Display notice/alerts in the front end: from n/a through 1.1.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T18:54:35.000000Z"}, {"uuid": "23ae8fcb-b8bd-4799-8f2a-ee90e0260cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22677", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113940472128711718", "content": "", "creation_timestamp": "2025-02-03T14:40:30.459314Z"}, {"uuid": "8b5b6b87-ab3a-428d-b4de-95f8caa982e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22679", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113940472144203730", "content": "", "creation_timestamp": "2025-02-03T14:40:30.828934Z"}, {"uuid": "6ea0ce26-bb75-4223-b973-aaa35ef80080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22676", "type": "seen", "source": "https://t.me/cvedetector/18207", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22676 - AWS S3 for WordPress Plugin - Upcasted Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22676 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in upcasted AWS S3 for WordPress Plugin \u2013 Upcasted allows Stored XSS. This issue affects AWS S3 for WordPress Plugin \u2013 Upcasted: from n/a through 3.0.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:29.000000Z"}, {"uuid": "c1d351a1-87e8-478e-8d3a-579f2e7ebdb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2267", "type": "seen", "source": "https://t.me/cvedetector/20354", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2267 - WordPress WP01 Plugin Arbitrary File Download Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2267 \nPublished : March 15, 2025, 4:15 a.m. | 1\u00a0hour, 35\u00a0minutes ago \nDescription : The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-15T06:55:43.000000Z"}, {"uuid": "66dbdc37-97f2-4d27-918e-f1dcb26bbecd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22674", "type": "seen", "source": "https://t.me/cvedetector/17211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22674 - Get Bowtied Product Blocks for WooCommerce Cross-site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22674 \nPublished : Feb. 4, 2025, 3:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Get Bowtied Product Blocks for WooCommerce allows Stored XSS. This issue affects Product Blocks for WooCommerce: from n/a through 1.9.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T18:54:28.000000Z"}, {"uuid": "84b75e0a-06ab-4001-909d-fe2d25cc3790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22677", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhbtjyepbd2j", "content": "", "creation_timestamp": "2025-02-03T15:16:21.036107Z"}, {"uuid": "89e8c677-5c67-4f6a-8daa-7f76d44ed955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22679", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhbtk2sata27", "content": "", "creation_timestamp": "2025-02-03T15:16:23.761676Z"}, {"uuid": "63555c8f-88d2-4f64-b772-41b1d6bbc952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22676", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4716", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22676\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:33.000000Z"}, {"uuid": "c30560a5-803f-4ec0-8079-2c60a4fe9320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2267", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7657", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2267\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information.\n\ud83d\udccf Published: 2025-03-15T03:23:23.948Z\n\ud83d\udccf Modified: 2025-03-15T03:23:23.948Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/900d09e8-ded5-49b9-81bf-ddfc85d3cf2b?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp01/trunk/inc/class-wp01.php#L109\n3. https://wordpress.org/plugins/wp01/", "creation_timestamp": "2025-03-15T03:49:04.000000Z"}, {"uuid": "678331ba-26d2-4558-a9ea-d06e9343a7cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22674", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhedyywyac2t", "content": "", "creation_timestamp": "2025-02-04T15:16:24.438801Z"}, {"uuid": "3bc9309e-5b5f-4593-9a80-83dafaf5b058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22675", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhedz3pyef2n", "content": "", "creation_timestamp": "2025-02-04T15:16:27.212177Z"}, {"uuid": "eb95848b-b10f-4c41-bdca-2227b842c95c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2267", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkfdkxqzon2x", "content": "", "creation_timestamp": "2025-03-15T04:56:50.114397Z"}, {"uuid": "e9ff07ba-d1ac-43a6-91de-5e930297523d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22676", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114015984140586297", "content": "", "creation_timestamp": "2025-02-16T22:44:16.606212Z"}, {"uuid": "c1d0eb31-7e44-4448-ae5c-147b5ffd8c9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22676", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lidefnopje2o", "content": "", "creation_timestamp": "2025-02-16T23:16:00.630536Z"}, {"uuid": "918ecdcc-f8be-46ff-a506-8d9d2da5fe47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22676", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4jw2cr26", "content": "", "creation_timestamp": "2025-02-17T02:45:40.961093Z"}, {"uuid": "432629b2-1f2d-4889-902d-5cee03accecb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22676", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}]}