{"vulnerability": "cve-2025-2652", "sightings": [{"uuid": "603965d1-6e66-41d0-9edf-73c19923b994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114061063435730740", "content": "", "creation_timestamp": "2025-02-24T21:48:27.985655Z"}, {"uuid": "130efa21-828a-4331-a8c9-ac4e0a9fa6b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26525", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114061063378286532", "content": "", "creation_timestamp": "2025-02-24T21:48:28.075659Z"}, {"uuid": "90497d3b-a8f7-4d0d-81c8-fef3405ece10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26526", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114061067757652213", "content": "", "creation_timestamp": "2025-02-24T21:49:33.509835Z"}, {"uuid": "65680598-1596-4512-95a0-c01296afc716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26527", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lixhf53kgj2t", "content": "", "creation_timestamp": "2025-02-24T23:02:42.195658Z"}, {"uuid": "aad2f8e4-7988-4eca-bf59-caab08485199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26525", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lixhf4urbg23", "content": "", "creation_timestamp": "2025-02-24T23:02:41.450922Z"}, {"uuid": "1cff901f-e700-4f4c-b8bf-d93696e958f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26520", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113989466702722722", "content": "", "creation_timestamp": "2025-02-12T06:20:28.297562Z"}, {"uuid": "c826a91b-2735-4bfc-a808-365f6cc7d283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26520", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxmuiq5qt2z", "content": "", "creation_timestamp": "2025-02-12T07:15:32.457297Z"}, {"uuid": "ce54a524-74c5-435c-95dd-6142f1eb8771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26520", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhxqqrgr7v2w", "content": "", "creation_timestamp": "2025-02-12T08:25:01.574399Z"}, {"uuid": "6056439f-fe2f-4779-bae1-665e1cdc0b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26524", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114002050952858526", "content": "", "creation_timestamp": "2025-02-14T11:40:48.662782Z"}, {"uuid": "bdc9f62a-ac67-41d1-86b9-c30528a66c9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26522", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li56mkzjve2g", "content": "", "creation_timestamp": "2025-02-14T12:16:31.966238Z"}, {"uuid": "96308bb0-a6b3-48de-838b-b71fe4a87c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26523", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li56mnso2b2h", "content": "", "creation_timestamp": "2025-02-14T12:16:34.854117Z"}, {"uuid": "93f1caa3-0008-463c-b5f5-860ec72b308d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26524", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li56mr7hua2a", "content": "", "creation_timestamp": "2025-02-14T12:16:38.728017Z"}, {"uuid": "429ae428-f015-4472-9a60-48450db864eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26523", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5gvozuk62v", "content": "", "creation_timestamp": "2025-02-14T14:44:48.021665Z"}, {"uuid": "d8631d0f-e0de-4eef-b7a2-aaa6f704087b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26522", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5gvpgewc2a", "content": "", "creation_timestamp": "2025-02-14T14:44:49.220376Z"}, {"uuid": "52ffe88d-0323-4854-9ebf-79da66e78ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26524", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5gvpmwsb23", "content": "", "creation_timestamp": "2025-02-14T14:44:50.260542Z"}, {"uuid": "329033d2-8e00-4e63-a0c0-7c509395f2b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/115827618252389069", "content": "", "creation_timestamp": "2026-01-02T21:26:36.990168Z"}, {"uuid": "e8590b26-97e3-4bc4-bb4a-a455903df2ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/29708", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aEnvironment used to find Moodle CVE-2025-26529\nURL\uff1ahttps://github.com/NightBloodz/moodleTestingEnv\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-04T17:47:34.000000Z"}, {"uuid": "040d9feb-2a43-4ee1-9fc1-7fc3bad1d663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26526", "type": "seen", "source": "https://t.me/cvedetector/18823", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26526 - Apache Feedback Vulnerability (Information Disclosure)\", \n  \"Content\": \"CVE ID : CVE-2025-26526 \nPublished : Feb. 24, 2025, 8:15 p.m. | 52\u00a0minutes ago \nDescription : Separate Groups mode restrictions were not factored into permission   \nchecks before allowing viewing or deletion of responses in Feedback   \nactivities. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T22:08:32.000000Z"}, {"uuid": "7ebabc0e-e038-4b99-8d8a-40c45d546417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26525", "type": "seen", "source": "https://t.me/cvedetector/18822", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26525 - Adobe TeX Arbitrary File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26525 \nPublished : Feb. 24, 2025, 8:15 p.m. | 52\u00a0minutes ago \nDescription : Insufficient sanitizing in the TeX notation filter resulted in an   \narbitrary file read risk on sites where pdfTeX is available (such as   \nthose with TeX Live installed). \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T22:08:31.000000Z"}, {"uuid": "d760337d-69cb-4c03-9314-756947edcb0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "seen", "source": "https://t.me/cvedetector/18826", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26529 - Apache Site Administration Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26529 \nPublished : Feb. 24, 2025, 8:15 p.m. | 52\u00a0minutes ago \nDescription : Description information displayed in the site administration live log   \nrequired additional sanitizing to prevent a stored XSS risk. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T22:08:35.000000Z"}, {"uuid": "83cfadef-0c4c-4d0f-b6bf-8fb2f872b42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26528", "type": "seen", "source": "https://t.me/cvedetector/18825", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26528 - Apache Drupal Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26528 \nPublished : Feb. 24, 2025, 8:15 p.m. | 52\u00a0minutes ago \nDescription : The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk. \nSeverity: 3.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T22:08:34.000000Z"}, {"uuid": "7aca4900-690a-4049-9be6-dc2f6e162749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26527", "type": "seen", "source": "https://t.me/cvedetector/18824", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26527 - Apache Struts Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26527 \nPublished : Feb. 24, 2025, 8:15 p.m. | 52\u00a0minutes ago \nDescription : Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T22:08:32.000000Z"}, {"uuid": "6ec3d96a-4acc-4ba8-b8da-eec799678163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26522", "type": "seen", "source": "Telegram/Ow6oNzEJFm7JRAZNefjxtMMFrjzbIU4qkyEc9XWFsoRGL04O", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "4d02fa11-70be-4737-bfcd-7b70cd5bf876", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26520", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4043", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26520\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T07:15:08.617\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/Cacti/cacti/commit/7fa60c03ad4a69c701ac6b77c85a8927df7acd51\n2. https://github.com/Cacti/cacti/pull/6096", "creation_timestamp": "2025-02-12T09:08:41.000000Z"}, {"uuid": "546e505f-5f55-428e-ba5d-ae661cfa61ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26520", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4057", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26520\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146.\n\ud83d\udccf Published: 2025-02-12T09:31:42Z\n\ud83d\udccf Modified: 2025-02-12T09:31:42Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26520\n2. https://github.com/Cacti/cacti/pull/6096\n3. https://github.com/Cacti/cacti/commit/7fa60c03ad4a69c701ac6b77c85a8927df7acd51", "creation_timestamp": "2025-02-12T10:10:19.000000Z"}, {"uuid": "f15b98c2-62a1-498d-b507-90ecd7adb290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26528", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5211", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26528\n\ud83d\udd25 CVSS Score: 3.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N)\n\ud83d\udd39 Description: The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.\n\ud83d\udccf Published: 2025-02-24T19:50:11.812Z\n\ud83d\udccf Modified: 2025-02-24T20:13:02.785Z\n\ud83d\udd17 References:\n1. https://moodle.org/mod/forum/discuss.php?d=466144\n2. http://git.moodle.org/gw?p=moodle.git&amp;a=search&amp;h=HEAD&amp;st=commit&amp;s=MDL-82896", "creation_timestamp": "2025-02-24T20:22:14.000000Z"}, {"uuid": "07e58931-b9c8-41f4-9c3e-1a11c7fc1fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5210", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26529\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Description information displayed in the site administration live log \nrequired additional sanitizing to prevent a stored XSS risk.\n\ud83d\udccf Published: 2025-02-24T19:52:48.821Z\n\ud83d\udccf Modified: 2025-02-24T20:14:08.198Z\n\ud83d\udd17 References:\n1. https://moodle.org/mod/forum/discuss.php?d=466145\n2. http://git.moodle.org/gw?p=moodle.git&amp;a=search&amp;h=HEAD&amp;st=commit&amp;s=MDL-84145", "creation_timestamp": "2025-02-24T20:22:13.000000Z"}, {"uuid": "727b2d15-db36-4e4d-be65-80a722ffe502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/31430", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aSSRF to XSS - XSS to RCE Moodle\nURL\uff1ahttps://github.com/Astroo18/PoC-CVE-2025-26529\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-12T23:20:27.000000Z"}, {"uuid": "82eed790-efda-4e4f-a8e2-d4457e6112bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26521", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18352", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26521\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A member of the project who can access the CKS-based Kubernetes cluster, can also access the API key and secret key of the 'kubeadmin' user of the CKS cluster's creator's account. An attacker who's a member of the project can exploit this to impersonate and perform privileged actions that can result in complete compromise of the confidentiality, integrity, and availability of resources owned by the creator's account.\n\nCKS users are recommended to upgrade to version 4.19.3.0 or 4.20.1.0, which fixes this issue.Updating Existing Kubernetes Clusters in ProjectsA service account should be created for each project to provide limited access specifically for Kubernetes cluster providers and autoscaling. Follow the steps below to create a new service account, update the secret inside the cluster, and regenerate existing API and service keys:1. Create a New Service AccountCreate a new account using the role \"Project Kubernetes Service Role\" with the following details:\n\nAccount Name\nkubeadmin-\nFirst Name\nKubernetes\nLast Name\nService User\nAccount Type\n0 (Normal User)\nRole ID\n\n\n\n\n2. Add the Service Account to the ProjectAdd this account to the project where the Kubernetes cluster(s) are hosted.\n3. Generate API and Secret KeysGenerate API Key and Secret Key for the default user of this account.\n4. Update the CloudStack Secret in the Kubernetes ClusterCreate a temporary file `/tmp/cloud-config` with the following data:\n\u00a0\u00a0\u00a0api-url =   \u00a0 \u00a0  # For example: /client/api\n\u00a0 api-key = \n\u00a0 secret-key = \n\u00a0 project-id = \n\n\n\n\nDelete the existing secret using kubectl and Kubernetes cluster config:\n\u00a0\u00a0\u00a0./kubectl --kubeconfig kube.conf -n kube-system delete secret cloudstack-secret\n\n\n\n\nCreate a new secret using kubectl and Kubernetes cluster config:\n\u00a0 \u00a0 ./kubectl --kubeconfig kube.conf -n kube-system create secret generic cloudstack-secret --from-file=/tmp/cloud-config\n\n\n\n\nRemove the temporary file:\n\u00a0 \u00a0 rm /tmp/cloud-config5. Regenerate API and Secret KeysRegenerate the API and secret keys for the original user account that was used to create the Kubernetes cluster.\n\ud83d\udccf Published: 2025-06-10T23:08:48.602Z\n\ud83d\udccf Modified: 2025-06-14T03:56:16.937Z\n\ud83d\udd17 References:\n1. https://cloudstack.apache.org/blog/cve-advisories-4.19.3.0-4.20.1.0/\n2. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-19-3-0-and-4-20-1-0/\n3. https://lists.apache.org/thread/y3qnwn59t8qggtdohv7k7vw39bgb3d60", "creation_timestamp": "2025-06-14T04:33:41.000000Z"}, {"uuid": "826c2d80-98c6-4aac-ba80-5dc43d5eb543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/16737", "content": "\"PoC for CVE-2025-26529: Moodle XSS to RCE Exploit\"\n\nCredit: youtube.com/@A5troRo0t", "creation_timestamp": "2025-05-02T18:33:03.000000Z"}, {"uuid": "45947018-5fe8-4ba3-9383-a05374c0f29e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "Telegram/MKbDAY2Rgx9FRJ10NVo62t2l6PAL1hhNybr5tRYKNVVonWg", "content": "", "creation_timestamp": "2025-04-13T05:00:06.000000Z"}, {"uuid": "129f08c8-b617-42ed-9d6e-3cfce180ca79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26523", "type": "seen", "source": "Telegram/mq9OGphltNzAfX_rK28jKvoPpWjVBtqMeBmm56jWdzOViFs", "content": "", "creation_timestamp": "2025-02-14T13:30:25.000000Z"}, {"uuid": "1731bffb-2e55-4f05-97bf-e8946262cc7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26520", "type": "published-proof-of-concept", "source": "Telegram/W1RaJbxP7aw5ZBjeHBop3Gqrbe7DtiBFnGW4POwIxVuORYc", "content": "", "creation_timestamp": "2025-02-12T08:00:31.000000Z"}, {"uuid": "fa3d7085-cbe2-4ad2-ba55-dfb672451029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26520", "type": "seen", "source": "Telegram/e5Igf34zCxbOOhI7SYsOXH-B3hp5gwu3Znp0Vfb8ELp9bRcd", "content": "", "creation_timestamp": "2025-02-14T10:04:03.000000Z"}, {"uuid": "4619f896-ca11-46fd-bbeb-65793b20b41a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26524", "type": "seen", "source": "Telegram/V-GXo1goNlQsTb1Vrsy42O4_0PHzzgN1IaYuMcqul-AxTjz6", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "58fd4634-abf5-4e48-bb0c-78e471c52465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26526", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5213", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26526\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Separate Groups mode restrictions were not factored into permission \nchecks before allowing viewing or deletion of responses in Feedback \nactivities.\n\ud83d\udccf Published: 2025-02-24T19:39:23.646Z\n\ud83d\udccf Modified: 2025-02-24T20:11:24.973Z\n\ud83d\udd17 References:\n1. https://moodle.org/mod/forum/discuss.php?d=466142\n2. http://git.moodle.org/gw?p=moodle.git&amp;a=search&amp;h=HEAD&amp;st=commit&amp;s=MDL-79976", "creation_timestamp": "2025-02-24T20:22:15.000000Z"}, {"uuid": "f091db17-da87-432c-a6f2-5a923166d1f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26527", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5212", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26527\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.\n\ud83d\udccf Published: 2025-02-24T19:44:06.228Z\n\ud83d\udccf Modified: 2025-02-24T20:12:14.116Z\n\ud83d\udd17 References:\n1. https://moodle.org/mod/forum/discuss.php?d=466143\n2. http://git.moodle.org/gw?p=moodle.git&amp;a=search&amp;h=HEAD&amp;st=commit&amp;s=MDL-83941", "creation_timestamp": "2025-02-24T20:22:15.000000Z"}, {"uuid": "e565f731-7a2b-49c6-bbb1-33f5ea3e7994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26520", "type": "seen", "source": "https://t.me/cvedetector/17832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26520 - Cacti SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-26520 \nPublished : Feb. 12, 2025, 7:15 a.m. | 1\u00a0hour, 28\u00a0minutes ago \nDescription : Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T10:11:03.000000Z"}, {"uuid": "dac8c7ca-6898-4b3c-8d36-68ed0e5446df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "Telegram/hamX_hI5yzIYjKWWv7LiY3F27OagmVDHwswKvlF8SqWE-rw", "content": "", "creation_timestamp": "2025-05-04T13:00:06.000000Z"}, {"uuid": "2f7d3b9b-e919-4f5b-a9ce-9b7ef5c829a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_News/11988", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer\nTitle: [Video] CVE-2025-26529: Moodle XSS to RCE Exploit\nLink: https://darkwebinformer.com/video-cve-2025-26529-moodle-xss-to-rce-exploit/", "creation_timestamp": "2026-01-02T21:45:23.000000Z"}, {"uuid": "094874a9-28f1-4101-adca-79633d3a8bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26523", "type": "seen", "source": "Telegram/IMoaYS96E3Kp4Q84vXiw9kcnHpiO_CLWP81Uw5zikfe0tEvN", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "ab888826-d05c-4a2d-9ad0-e3d993665aa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26525", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5214", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26525\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Insufficient sanitizing in the TeX notation filter resulted in an \narbitrary file read risk on sites where pdfTeX is available (such as \nthose with TeX Live installed).\n\ud83d\udccf Published: 2025-02-24T19:31:43.881Z\n\ud83d\udccf Modified: 2025-02-24T20:10:27.216Z\n\ud83d\udd17 References:\n1. https://moodle.org/mod/forum/discuss.php?d=466141\n2. https://git.moodle.org/gw?p=moodle.git&amp;a=search&amp;h=HEAD&amp;st=commit&amp;s=MDL-84136", "creation_timestamp": "2025-02-24T20:22:16.000000Z"}, {"uuid": "7806f1fc-7b93-4006-ae39-bc774b2faa70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2652", "type": "seen", "source": "https://t.me/cvedetector/20904", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2652 - SourceCodester Employee and Visitor Gate Pass Logging System Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-2652 \nPublished : March 23, 2025, 3:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : A vulnerability has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to exposure of information through directory listing. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. Multiple sub-directories are affected. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-23T18:09:22.000000Z"}, {"uuid": "d39e82d9-7c15-4b45-b088-2afcd2c492bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "Telegram/gptxcG5Jvg83wR56zKKTs8fGBMXLE7PNQ-HCnd7IEVmsKx8", "content": "", "creation_timestamp": "2025-04-05T21:00:06.000000Z"}, {"uuid": "5dfacd2c-ee9f-4413-bde2-ffef8f58f072", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "Telegram/sQCbqznhLKENEy-bIT4Xf2mLEDHHNqQzKWW8VQqo_AcxwBM", "content": "", "creation_timestamp": "2025-04-04T23:00:05.000000Z"}, {"uuid": "76d03104-545d-4376-b62e-52b4c3de3ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26529", "type": "published-proof-of-concept", "source": "Telegram/yz-re6hv4HBNtD8QCY9Fpk3BchuuqqONLsvHUNJFjgnlHcI", "content": "", "creation_timestamp": "2025-04-13T09:00:06.000000Z"}, {"uuid": "c171a278-c9ee-4db2-a6a2-24d8826e5092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26522", "type": "seen", "source": "Telegram/mq9OGphltNzAfX_rK28jKvoPpWjVBtqMeBmm56jWdzOViFs", "content": "", "creation_timestamp": "2025-02-14T13:30:25.000000Z"}]}