{"vulnerability": "cve-2025-2677", "sightings": [{"uuid": "8abf62ca-3f25-4a7a-8501-f6e88b4443d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26770", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019106718981143", "content": "", "creation_timestamp": "2025-02-17T11:58:19.074089Z"}, {"uuid": "58f2fb17-1cf9-479f-93c5-90ab4247a47d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26771", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019106732507120", "content": "", "creation_timestamp": "2025-02-17T11:58:19.519999Z"}, {"uuid": "04f425a3-29cd-4d0d-8639-b0164eb26de0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26772", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019106747667606", "content": "", "creation_timestamp": "2025-02-17T11:58:19.621280Z"}, {"uuid": "3ab6661b-f6a1-4fc5-a27e-0c65a6de98ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26773", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019165748489625", "content": "", "creation_timestamp": "2025-02-17T12:13:20.266477Z"}, {"uuid": "8c4867ca-6727-4a4d-9741-67ab9d5326af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26775", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019165764888577", "content": "", "creation_timestamp": "2025-02-17T12:13:20.378646Z"}, {"uuid": "7e0e9274-8a0f-4d3b-852a-c10a67f81933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26778", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114019165778563855", "content": "", "creation_timestamp": "2025-02-17T12:13:20.473758Z"}, {"uuid": "4a7acbed-c8d3-4217-85fe-af2914b35b59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26770", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepycicip2i", "content": "", "creation_timestamp": "2025-02-17T12:15:57.750345Z"}, {"uuid": "0e54d345-06fa-4a1d-b622-ad9ba257ac18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26771", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepyzl3zt2t", "content": "", "creation_timestamp": "2025-02-17T12:16:21.583296Z"}, {"uuid": "1f1fac6d-8904-491d-8baf-cbb9ca84cf8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26772", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepz4mp5t2h", "content": "", "creation_timestamp": "2025-02-17T12:16:24.689339Z"}, {"uuid": "71dee3b2-f43d-4b92-9d83-b0191c0b8b88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26773", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepz72wab2n", "content": "", "creation_timestamp": "2025-02-17T12:16:27.337268Z"}, {"uuid": "41dc1156-0c24-4fac-9939-c7500df81c17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26775", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepzbipdh2i", "content": "", "creation_timestamp": "2025-02-17T12:16:29.892241Z"}, {"uuid": "a146224a-1954-47b7-acf8-36533b12cf74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26778", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3liepzefytr2n", "content": "", "creation_timestamp": "2025-02-17T12:16:32.883660Z"}, {"uuid": "34311c47-bf8d-490b-a618-8b98b66798b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26775", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezyvzcco2y", "content": "", "creation_timestamp": "2025-02-17T15:15:15.280620Z"}, {"uuid": "fac7044d-fe75-4889-a288-4a3da62c1635", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26771", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezywfiba2a", "content": "", "creation_timestamp": "2025-02-17T15:15:16.568179Z"}, {"uuid": "273c3d12-3418-4f22-8557-0275af2474db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26772", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezywinnc2c", "content": "", "creation_timestamp": "2025-02-17T15:15:17.125479Z"}, {"uuid": "3467585c-f91b-42de-bff8-5ede5b184a74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26773", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezywvjjf26", "content": "", "creation_timestamp": "2025-02-17T15:15:19.292060Z"}, {"uuid": "03871437-c2ae-482a-b85d-a554259e34df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26770", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezyx76jq2a", "content": "", "creation_timestamp": "2025-02-17T15:15:21.064937Z"}, {"uuid": "089e45b0-520e-45dd-b670-b5304dcb66f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26778", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liezyxiwzq2a", "content": "", "creation_timestamp": "2025-02-17T15:15:22.865667Z"}, {"uuid": "96ac5073-b251-4de9-9ed1-cedf165174f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "3a02a344-8407-45dc-9f82-41ebf1d77f0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26778", "type": "seen", "source": "https://t.me/cvedetector/18247", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26778 - Adobe NotFound Gallery Stored Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26778 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:09.000000Z"}, {"uuid": "8ce4568f-4e93-40d1-838b-cea5c869e559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26775", "type": "seen", "source": "https://t.me/cvedetector/18246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26775 - RealMag777 BEAR Stored Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-26775 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 BEAR allows Stored XSS. This issue affects BEAR: from n/a through 1.1.4.4. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:09.000000Z"}, {"uuid": "689020b9-efe1-4ffd-9e54-22b6e9514f9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://t.me/cvedetector/18723", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26776 - Chaty Pro Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26776 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Chaty Pro allows Upload a Web Shell to a Web Server. This issue affects Chaty Pro: from n/a through 3.3.3. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:09.000000Z"}, {"uuid": "92e0b05c-5f84-4e75-81a4-01ce366a8887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26774", "type": "seen", "source": "https://t.me/cvedetector/18721", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26774 - Rock Solid Responsive Modal Builder for High Conversion \u2013 Easy Popups Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-26774 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rock Solid Responsive Modal Builder for High Conversion \u2013 Easy Popups allows Reflected XSS. This issue affects Responsive Modal Builder for High Conversion \u2013 Easy Popups: from n/a through 1.5.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:08.000000Z"}, {"uuid": "45ced357-7eea-47e1-b0b8-fe720646a7b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26773", "type": "seen", "source": "Telegram/EgY-3dooiREg-dALgS8idmo8jFkn1Hp5AACRbJP7ZYbsQN4", "content": "", "creation_timestamp": "2026-04-01T21:28:26.000000Z"}, {"uuid": "f668a176-fed8-4519-b824-8f7b0114b1e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26774", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5033", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26774\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rock Solid Responsive Modal Builder for High Conversion \u2013 Easy Popups allows Reflected XSS. This issue affects Responsive Modal Builder for High Conversion \u2013 Easy Popups: from n/a through 1.5.0.\n\ud83d\udccf Published: 2025-02-22T15:52:48.226Z\n\ud83d\udccf Modified: 2025-02-22T15:52:48.226Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/easy-popups/vulnerability/wordpress-responsive-modal-builder-for-high-conversion-easy-popups-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:01.000000Z"}, {"uuid": "a3bf3be2-4b30-41b8-99a2-2f1027d6f658", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5032", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26776\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Chaty Pro allows Upload a Web Shell to a Web Server. This issue affects Chaty Pro: from n/a through 3.3.3.\n\ud83d\udccf Published: 2025-02-22T15:52:48.403Z\n\ud83d\udccf Modified: 2025-02-22T15:52:48.403Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/chaty-pro/vulnerability/wordpress-chaty-pro-plugin-3-3-3-arbitrary-file-upload-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:00.000000Z"}, {"uuid": "9af7fd47-8a76-462b-85c3-2b689efad7a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26779", "type": "seen", "source": "https://t.me/cvedetector/18201", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26779 - Fahad Mahmood Keep Backup Daily Path Traversal\", \n  \"Content\": \"CVE ID : CVE-2025-26779 \nPublished : Feb. 16, 2025, 11:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fahad Mahmood Keep Backup Daily allows Path Traversal. This issue affects Keep Backup Daily: from n/a through 2.1.0. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T01:29:19.000000Z"}, {"uuid": "77585484-7297-4176-8ae3-292b70a8a853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://t.me/cybersecplayground/125", "content": "\ud83d\udea8 Critical Zero-Day in Chaty Pro Plugin \u2013 CVE-2025-26776 \ud83d\udea8\n\n\ud83d\udd34 Severity: 10.0 (Critical)\n\ud83d\udd34 Vulnerability: Unrestricted File Upload\n\ud83d\udd34 Impact: Full website takeover via malicious file execution\n\n\u26a0\ufe0f What\u2019s the Risk?\nThe Chaty Pro Plugin is affected by a dangerous file upload vulnerability, allowing attackers to:\n\ud83d\udd25 Upload and execute malicious PHP scripts\n\ud83d\udd25 Gain remote access &amp; escalate privileges\n\ud83d\udd25 Modify or delete website data\n\ud83d\udd25 Deploy web shells for persistent control\n\n\ud83d\udd0d How to Detect Affected Sites?\n\ud83d\udd17 Netlas.io\n\ud83d\udc49\ud83c\udffb Query : http.body:\"plugins/chaty-pro\"\n\n\n\ud83d\udca1 Manual Check:\n1\ufe0f\u20e3 Inspect /wp-content/uploads/chaty/ for suspicious files\n2\ufe0f\u20e3 Review server logs for unexpected file upload activity\n3\ufe0f\u20e3 Ensure the plugin is updated to the latest patched version\n\n\ud83d\ude80 Mitigation Steps\n\u2705 Update Chaty Pro Plugin to the latest security patch\n\u2705 Restrict file upload permissions (only allow safe file types)\n\u2705 Monitor /uploads/ directory for unauthorized files\n\u2705 Implement a Web Application Firewall (WAF)\n\n\ud83d\udcf0 Stay Tuned for more information and poc\n\n\ud83d\udce2 Protect your website today! Join us \ud83d\udc49 @cybersecplayground\n\n#WordPress #ChatyPro #CyberSecurity #WebSecurity #Pentesting", "creation_timestamp": "2025-03-06T23:30:03.000000Z"}, {"uuid": "6348ffec-e3dd-425e-b2a8-63b39019fe5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2677", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll3vwl2b2s24", "content": "", "creation_timestamp": "2025-03-24T04:24:01.127212Z"}, {"uuid": "bac679fa-e5c7-4bc2-b566-e4615d350139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26776", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljotiuzw622l", "content": "", "creation_timestamp": "2025-03-06T06:10:45.016916Z"}, {"uuid": "d501912c-c488-4b85-ab2d-e1a1e01d3dad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26779", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}, {"uuid": "fdc17d94-9dab-48de-b8b7-c836bb95af92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26772", "type": "seen", "source": "https://t.me/cvedetector/18254", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26772 - Detheme DethemeKit For Elementor Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26772 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Detheme DethemeKit For Elementor allows Stored XSS. This issue affects DethemeKit For Elementor: from n/a through 2.1.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:18.000000Z"}, {"uuid": "538d380a-47fe-4b09-9a82-bc27e386568b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26771", "type": "seen", "source": "https://t.me/cvedetector/18253", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26771 - SKT Blocks - Gutenberg Based Page Builder Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26771 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Blocks \u2013 Gutenberg based Page Builder allows Stored XSS. This issue affects SKT Blocks \u2013 Gutenberg based Page Builder: from n/a through 1.7. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:17.000000Z"}, {"uuid": "ec8c9fc3-a45c-4920-8739-13307b07a246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26770", "type": "seen", "source": "https://t.me/cvedetector/18252", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26770 - Waymark Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26770 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Waymark allows Stored XSS. This issue affects Waymark: from n/a through 1.5.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:16.000000Z"}, {"uuid": "a7a79034-075e-4d0e-9fb1-cf88a840942c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3litrvidjwc2r", "content": "", "creation_timestamp": "2025-02-23T12:00:07.418990Z"}, {"uuid": "85e2afea-ad23-4046-8bc2-47a4acafac5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26779", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lidegi4sjb2y", "content": "", "creation_timestamp": "2025-02-16T23:16:28.346502Z"}, {"uuid": "4c25de39-05d8-4902-b466-2866a4146941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26779", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114016161268534088", "content": "", "creation_timestamp": "2025-02-16T23:29:16.565984Z"}, {"uuid": "69da1434-1cb8-401b-940b-b5db10dcb3a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26779", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lidq4jssos2m", "content": "", "creation_timestamp": "2025-02-17T02:45:40.378188Z"}, {"uuid": "a4730714-e81f-4b46-b6cb-2eed4c3cea44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114048796379381479", "content": "", "creation_timestamp": "2025-02-22T17:48:47.493711Z"}, {"uuid": "897e1a32-1aea-4668-b06b-59c3d0697a68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lis24njeyl2k", "content": "", "creation_timestamp": "2025-02-22T19:21:57.246106Z"}, {"uuid": "2ae0b17a-bae8-4383-b314-a3028cbf2b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lisjo24cv42s", "content": "", "creation_timestamp": "2025-02-23T00:00:09.100680Z"}, {"uuid": "633e62ec-49c5-457a-bb54-376ea9607749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:48.000000Z"}, {"uuid": "302857fa-b191-4cff-96fb-d8d17fd424a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26773", "type": "seen", "source": "https://t.me/cvedetector/18245", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26773 - Adnan Analytify Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26773 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Adnan Analytify allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Analytify: from n/a through 5.5.0. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:08.000000Z"}, {"uuid": "c78c7358-e161-4771-9912-4c868bba64d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26779", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4705", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26779\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-17T00:40:18.000000Z"}, {"uuid": "bbeecf61-826b-4828-b751-555fef80a1b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2677", "type": "seen", "source": "https://t.me/cvedetector/20928", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2677 - PHPGurukul Bank Locker Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2677 \nPublished : March 24, 2025, 2:15 a.m. | 25\u00a0minutes ago \nDescription : A vulnerability has been found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /changeidproof.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T04:11:16.000000Z"}, {"uuid": "9caca901-9815-462e-8601-8fe5b0215fa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "Telegram/gOAPc_68FAytvjpQcxQDSHOoNzTXG0sdIgqMI4upjjdos8Y", "content": "", "creation_timestamp": "2025-03-07T00:31:15.000000Z"}]}