{"vulnerability": "cve-2025-2270", "sightings": [{"uuid": "7877b3a2-d7dc-4cb7-8140-74049a74bb08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22701", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhbtkzsuke2w", "content": "", "creation_timestamp": "2025-02-03T15:16:56.911733Z"}, {"uuid": "71f1379e-6d9c-4c27-97b7-163ad9d81fc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22703", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113940649322901756", "content": "", "creation_timestamp": "2025-02-03T15:25:34.289343Z"}, {"uuid": "6522e387-6fe1-4636-9d42-356e654be333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22700", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhedzgh6ai27", "content": "", "creation_timestamp": "2025-02-04T15:16:38.437473Z"}, {"uuid": "b210b748-4803-4e38-941f-5e6f377e678d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22700", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113946638931725953", "content": "", "creation_timestamp": "2025-02-04T16:48:50.425160Z"}, {"uuid": "e40143e2-4b08-4c15-b81d-e2c0df7179b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22707", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mc22tm7hau2u", "content": "", "creation_timestamp": "2026-01-10T03:25:56.557774Z"}, {"uuid": "be080a02-abaa-4440-a15c-6115aff0a698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22708", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mc22ttff7y2t", "content": "", "creation_timestamp": "2026-01-10T03:26:04.419311Z"}, {"uuid": "6913840f-bea8-43af-80a4-aa6bc31fabe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22706", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgb254mppz2t", "content": "", "creation_timestamp": "2025-01-21T14:16:34.063174Z"}, {"uuid": "b31fbd39-43cb-4fc4-8127-9c75e62b56d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22709", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgb256rtwt27", "content": "", "creation_timestamp": "2025-01-21T14:16:36.552823Z"}, {"uuid": "219be35f-4f8b-4a5b-b2ca-bbd26820d1d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22704", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhbtl6sbvo2p", "content": "", "creation_timestamp": "2025-02-03T15:17:01.484230Z"}, {"uuid": "643b72bd-55e8-4d84-b2e8-5ddc1cdfa22b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22703", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhbtl45zgp2r", "content": "", "creation_timestamp": "2025-02-03T15:16:59.274907Z"}, {"uuid": "850ca613-8b0e-4971-95e7-711fc5e07a94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22701", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113940649308658622", "content": "", "creation_timestamp": "2025-02-03T15:25:34.354981Z"}, {"uuid": "0bac836b-64a8-41e5-ab79-e3c26b0664e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22704", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113940708321242887", "content": "", "creation_timestamp": "2025-02-03T15:40:34.342447Z"}, {"uuid": "38748506-1c1e-44dc-83cf-0398b7358da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22702", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114002321943293184", "content": "", "creation_timestamp": "2025-02-14T12:49:43.779127Z"}, {"uuid": "b3186e32-da7c-4999-9bda-3a25901b716a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22702", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114002337478890879", "content": "", "creation_timestamp": "2025-02-14T12:53:40.884299Z"}, {"uuid": "16fb898b-3519-464c-ac5f-e264f1bcc300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22705", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114002396506968844", "content": "", "creation_timestamp": "2025-02-14T13:08:41.439744Z"}, {"uuid": "a17fd009-7576-48b5-9c87-ca8b1ce191ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22702", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5bxcmr342a", "content": "", "creation_timestamp": "2025-02-14T13:16:13.673233Z"}, {"uuid": "c6177dec-f043-4ea4-ac3c-40214f7d60f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22705", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5bxeqgqw2z", "content": "", "creation_timestamp": "2025-02-14T13:16:16.659491Z"}, {"uuid": "350bac2e-f105-45d2-b407-f1f5f3e00ec6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22702", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "a37e6669-6f2a-436a-8994-6551ae5fa7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22708", "type": "seen", "source": "https://gist.github.com/Darkcrai86/bd9500714e3ed5fde8d7abdd5f9e2b7c", "content": "", "creation_timestamp": "2026-01-08T11:07:58.000000Z"}, {"uuid": "6cc837b2-56fe-45ae-b9ee-55b2d6da26e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22707", "type": "seen", "source": "https://gist.github.com/Darkcrai86/fef41f0bae83bc893ffcd86e3af25ebf", "content": "", "creation_timestamp": "2026-01-08T11:08:22.000000Z"}, {"uuid": "9c23d1f4-dac9-4046-af5d-6ca9ea5c95c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2270", "type": "seen", "source": "https://t.me/cvedetector/22098", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2270 - WordPress Countdown &amp; Clock Plugin Local File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2270 \nPublished : April 4, 2025, 6:15 a.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : The Countdown, Coming Soon, Maintenance \u2013 Countdown &amp; Clock plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.9.1 via the createCdObj function. This makes it possible for unauthenticated attackers to include and execute files with the specific filenames on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in some cases. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T10:29:37.000000Z"}, {"uuid": "394dd888-7eb2-45d3-a4aa-f37d3c5f86a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22706", "type": "seen", "source": "https://t.me/cvedetector/15971", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22706 - Social Pug: Author Box Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-22706 \nPublished : Jan. 21, 2025, 2:15 p.m. | 42\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in iova.mihai Social Pug: Author Box allows Reflected XSS. This issue affects Social Pug: Author Box: from n/a through 1.0.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T16:08:09.000000Z"}, {"uuid": "635ebe3c-ea0a-4b95-a502-e574b513318f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22700", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhegmtzp6u27", "content": "", "creation_timestamp": "2025-02-04T16:03:19.464860Z"}, {"uuid": "9ac84b2e-cf8d-4c7f-99a0-ccb2f9f87bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2270", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114278590616891511", "content": "", "creation_timestamp": "2025-04-04T07:48:29.369684Z"}, {"uuid": "83956940-0334-48e4-803b-6ff3e99bc0e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2270", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114278590616891511", "content": "", "creation_timestamp": "2025-04-04T07:48:29.382185Z"}, {"uuid": "f16eb358-9cd9-4c6c-af34-cc7a1914e133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2270", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxxalq2gt2o", "content": "", "creation_timestamp": "2025-04-04T08:02:03.610583Z"}, {"uuid": "8a7ec06d-a212-4f43-8d3c-5e4423bce5c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22703", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:19.000000Z"}, {"uuid": "977591a6-dc3f-462b-9969-4148278c3987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22701", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:19.000000Z"}, {"uuid": "bb047473-0cea-4d58-83f8-bc39bf509f62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22704", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:19.000000Z"}, {"uuid": "5b924cff-6bcc-4ae5-9161-0b73837c36fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22702", "type": "seen", "source": "Telegram/BJ_1hooadChjYx5hU4-W1LNooPrfZMUeNBD3Qyu1zLaWJjuj", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "8bd0119e-7090-42a1-b8ad-24406a8171d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22707", "type": "seen", "source": "Telegram/0IylyGSboEmKCHUPY4eAowSbZvYOKrVocDJ9Z5IoL0N8f_w", "content": "", "creation_timestamp": "2026-01-08T18:13:25.000000Z"}, {"uuid": "ce02b060-e770-4519-aadd-5b3c4484b6cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22708", "type": "seen", "source": "Telegram/0IylyGSboEmKCHUPY4eAowSbZvYOKrVocDJ9Z5IoL0N8f_w", "content": "", "creation_timestamp": "2026-01-08T18:13:25.000000Z"}, {"uuid": "e9916424-a71c-4a92-80e5-298cdfe64b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2270", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10395", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2270\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Countdown, Coming Soon, Maintenance \u2013 Countdown &amp; Clock plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.9.1 via the createCdObj function. This makes it possible for unauthenticated attackers to include and execute files with the specific filenames on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in some cases.\n\ud83d\udccf Published: 2025-04-04T05:22:46.133Z\n\ud83d\udccf Modified: 2025-04-04T05:22:46.133Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/c2260d6b-1a41-4757-a063-8b8857ef416a?source=cve\n2. https://plugins.trac.wordpress.org/browser/countdown-builder/trunk/classes/RegisterPostType.php#L116", "creation_timestamp": "2025-04-04T05:35:51.000000Z"}, {"uuid": "251789d2-f879-40d4-92d2-e7f2c2dc07e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22700", "type": "seen", "source": "https://t.me/cvedetector/17207", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22700 - NotFound Traveler Code SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-22700 \nPublished : Feb. 4, 2025, 3:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Traveler Code. This issue affects Traveler Code: from n/a through 3.1.0. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T18:54:24.000000Z"}]}