{"vulnerability": "cve-2025-23202", "sightings": [{"uuid": "c8bade87-20eb-404e-8e6c-1c92b59145d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23202", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113845775391436167", "content": "", "creation_timestamp": "2025-01-17T21:17:52.893854Z"}, {"uuid": "6f4250d7-6c5c-4c8b-881d-f45cbc9cf3c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23202", "type": "seen", "source": "https://bsky.app/profile/b4nd1twillow.bsky.social/post/3ltdqtyp55k2i", "content": "", "creation_timestamp": "2025-07-07T02:35:57.861837Z"}, {"uuid": "72f212a6-cd1e-4047-86bf-8bb8b6f06526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23202", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2211", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23202\n\ud83d\udd39 Description: Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-17T20:18:20.352Z\n\ud83d\udccf Modified: 2025-01-17T20:18:20.352Z\n\ud83d\udd17 References:\n1. https://github.com/devycreates/Bible-Module/security/advisories/GHSA-cm7w-99v2-prrq\n2. https://github.com/devycreates/Bible-Module/commit/5b783855fc3285be2da8639c97ac37af28f8c55a", "creation_timestamp": "2025-01-17T20:57:56.000000Z"}, {"uuid": "542e3e72-798d-4ad4-9fd7-525397fc4f94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23202", "type": "seen", "source": "https://t.me/cvedetector/15742", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23202 - ROBLOX Bible Module API Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23202 \nPublished : Jan. 17, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T22:39:10.000000Z"}]}