{"vulnerability": "cve-2025-2656", "sightings": [{"uuid": "aa66def9-fe21-44f4-af33-7cefc92dff25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26561", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3dc2ikd62p", "content": "", "creation_timestamp": "2025-02-13T18:34:48.239656Z"}, {"uuid": "937c76a7-4408-4f1a-b54a-f9751f43d13a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26569", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3dc3iiuh2c", "content": "", "creation_timestamp": "2025-02-13T18:34:52.597688Z"}, {"uuid": "2d587ef2-857b-4689-9f8c-47fc3ba30954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26567", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3dc43r772h", "content": "", "creation_timestamp": "2025-02-13T18:34:55.987657Z"}, {"uuid": "b7a1c07c-8604-4648-828f-eb17cb5072e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26568", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3dc4cayw2p", "content": "", "creation_timestamp": "2025-02-13T18:34:57.145773Z"}, {"uuid": "0a03d0d0-adcd-4f4f-877b-8fc01663ef3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26562", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3dc4imz62z", "content": "", "creation_timestamp": "2025-02-13T18:34:58.296444Z"}, {"uuid": "d54e57cf-f99e-4856-bd24-e8837915ff3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26561", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lzgilj3l422l", "content": "", "creation_timestamp": "2025-09-22T13:17:11.638466Z"}, {"uuid": "9ab3e4da-489d-4a0b-871c-63f944012226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26562", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}, {"uuid": "259e6937-1eb2-4677-b4b7-2214b945f4bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26561", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}, {"uuid": "93263fd3-8f22-411d-b0c3-04910ce27fc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26569", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}, {"uuid": "42e5ccec-4bea-4726-830e-b689c53e7154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26567", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}, {"uuid": "dfc1fdde-bab4-4c48-86a4-482ae71b4ad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26565", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8871", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26565\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kagla GNUPress allows Reflected XSS. This issue affects GNUPress: from n/a through 0.2.9.\n\ud83d\udccf Published: 2025-03-26T14:24:19.637Z\n\ud83d\udccf Modified: 2025-03-26T15:09:58.419Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/gnupress/vulnerability/wordpress-gnupress-plugin-0-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:17.000000Z"}, {"uuid": "1f5e82b5-67b7-441b-8f39-921717b370d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26568", "type": "seen", "source": "https://t.me/cvedetector/18010", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26568 - Easy Amazon Product Information CSRF Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26568 \nPublished : Feb. 13, 2025, 2:16 p.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in jensmueller Easy Amazon Product Information allows Stored XSS. This issue affects Easy Amazon Product Information: from n/a through 4.0.1. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T17:09:50.000000Z"}, {"uuid": "7f06155b-aaac-4999-b80d-760fa0e2b223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26567", "type": "seen", "source": "https://t.me/cvedetector/18009", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26567 - Font Awesome WP Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26567 \nPublished : Feb. 13, 2025, 2:16 p.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in farjana55 Font Awesome WP allows DOM-Based XSS. This issue affects Font Awesome WP: from n/a through 1.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T17:09:49.000000Z"}, {"uuid": "bf2f4d1c-a732-4177-84f8-ab6714a6cb6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2656", "type": "seen", "source": "https://t.me/cvedetector/20910", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2656 - PHPGurukul Zoo Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2656 \nPublished : March 23, 2025, 5:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-23T19:49:44.000000Z"}, {"uuid": "81da8195-091c-4ccb-b489-1b3b55777c92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2656", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll32ufghss26", "content": "", "creation_timestamp": "2025-03-23T20:19:37.362631Z"}, {"uuid": "7afa89c7-8fe3-4805-a807-c3108a7c78c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26561", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li2uvd6kt42h", "content": "", "creation_timestamp": "2025-02-13T14:17:08.670197Z"}, {"uuid": "42f598f4-c7d2-40b3-bb92-1855e1d8f401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26562", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li2uvflsuk2i", "content": "", "creation_timestamp": "2025-02-13T14:17:11.096035Z"}, {"uuid": "c2158fa8-8901-4068-9664-2366add2eb42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26567", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li2uviffwb2p", "content": "", "creation_timestamp": "2025-02-13T14:17:14.116449Z"}, {"uuid": "aa98e55b-a78e-439a-90de-6044c003f6f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26568", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li2uvldulx2g", "content": "", "creation_timestamp": "2025-02-13T14:17:17.209760Z"}, {"uuid": "f9a7467b-2333-49aa-a0be-06059561d368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26569", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li2uvnl2l42x", "content": "", "creation_timestamp": "2025-02-13T14:17:19.598087Z"}, {"uuid": "40961d65-aab9-47f3-850f-f53ce22c0bb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26561", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997038228555798", "content": "", "creation_timestamp": "2025-02-13T14:26:00.721632Z"}, {"uuid": "7fbdeaa5-0872-4cfb-89ca-a41a452672ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26562", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997038242690243", "content": "", "creation_timestamp": "2025-02-13T14:26:00.951383Z"}, {"uuid": "5a7910f1-858a-42c7-a6fe-7ad4542ac3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26567", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997097242369848", "content": "", "creation_timestamp": "2025-02-13T14:41:01.011859Z"}, {"uuid": "fdf98ddf-4329-4136-ad43-8027226a59b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26568", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997097258121480", "content": "", "creation_timestamp": "2025-02-13T14:41:01.234712Z"}, {"uuid": "c6a8c8c9-ec1a-4e01-9464-2400c41bbc70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26569", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997097272742226", "content": "", "creation_timestamp": "2025-02-13T14:41:01.458670Z"}, {"uuid": "6937007d-3685-493c-8b99-d8e658bfe799", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26567", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4252", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26567\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T14:16:22.763\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/font-awesome-wp/vulnerability/wordpress-font-awesome-wp-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-13T15:12:17.000000Z"}, {"uuid": "a4b8dfbb-57cf-414e-9177-da721541bc37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26569", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4250", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26569\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T14:16:23.070\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/post-thumbs/vulnerability/wordpress-post-thumbs-plugin-1-5-csrf-to-stored-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-13T15:12:00.000000Z"}, {"uuid": "8e7073fb-2742-42e6-b38c-30e40700ee6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26561", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4254", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26561\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T14:16:22.450\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/yottie-lite/vulnerability/wordpress-elfsight-yottie-lite-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-13T15:12:21.000000Z"}, {"uuid": "f649b2af-6b39-4375-98a0-960a10d563b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26562", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4253", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26562\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T14:16:22.607\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/rss-filter/vulnerability/wordpress-rss-filter-plugin-1-2-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-13T15:12:20.000000Z"}, {"uuid": "3bb05aba-53e3-4262-b9f1-ef4ab141ab03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26566", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8872", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26566\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound In Stock Mailer for WooCommerce allows Reflected XSS. This issue affects In Stock Mailer for WooCommerce: from n/a through 2.1.1.\n\ud83d\udccf Published: 2025-03-26T14:24:19.773Z\n\ud83d\udccf Modified: 2025-03-26T15:09:38.406Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/in-stock-mailer-for-woocommerce/vulnerability/wordpress-in-stock-mailer-for-woocommerce-plugin-2-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-26T15:26:18.000000Z"}, {"uuid": "ad5feb3e-1f3c-40be-84c6-d1a207322563", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26562", "type": "seen", "source": "https://t.me/cvedetector/18012", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26562 - Shambhu Patnaik RSS Filter CSRF Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26562 \nPublished : Feb. 13, 2025, 2:16 p.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Shambhu Patnaik RSS Filter allows Stored XSS. This issue affects RSS Filter: from n/a through 1.2. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T17:09:51.000000Z"}, {"uuid": "e8a60388-7d87-4223-9257-ba806bf2b195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26561", "type": "seen", "source": "https://t.me/cvedetector/18008", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26561 - Elfsight Yottie Lite Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26561 \nPublished : Feb. 13, 2025, 2:16 p.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in elfsight Elfsight Yottie Lite allows Stored XSS. This issue affects Elfsight Yottie Lite: from n/a through 1.3.3. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T17:09:48.000000Z"}, {"uuid": "98fb4b03-79dc-49be-b3b5-58a9f4f4189b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26569", "type": "seen", "source": "https://t.me/cvedetector/18001", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26569 - Callmeforsox Post Thumbs CSRF Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26569 \nPublished : Feb. 13, 2025, 2:16 p.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in callmeforsox Post Thumbs allows Stored XSS. This issue affects Post Thumbs: from n/a through 1.5. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T17:09:37.000000Z"}]}