{"vulnerability": "cve-2025-26776", "sightings": [{"uuid": "a7a79034-075e-4d0e-9fb1-cf88a840942c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3litrvidjwc2r", "content": "", "creation_timestamp": "2025-02-23T12:00:07.418990Z"}, {"uuid": "689020b9-efe1-4ffd-9e54-22b6e9514f9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://t.me/cvedetector/18723", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26776 - Chaty Pro Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26776 \nPublished : Feb. 22, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Chaty Pro allows Upload a Web Shell to a Web Server. This issue affects Chaty Pro: from n/a through 3.3.3. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:09.000000Z"}, {"uuid": "a3bf3be2-4b30-41b8-99a2-2f1027d6f658", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5032", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26776\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Chaty Pro allows Upload a Web Shell to a Web Server. This issue affects Chaty Pro: from n/a through 3.3.3.\n\ud83d\udccf Published: 2025-02-22T15:52:48.403Z\n\ud83d\udccf Modified: 2025-02-22T15:52:48.403Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/chaty-pro/vulnerability/wordpress-chaty-pro-plugin-3-3-3-arbitrary-file-upload-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-22T16:25:00.000000Z"}, {"uuid": "9caca901-9815-462e-8601-8fe5b0215fa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "Telegram/gOAPc_68FAytvjpQcxQDSHOoNzTXG0sdIgqMI4upjjdos8Y", "content": "", "creation_timestamp": "2025-03-07T00:31:15.000000Z"}, {"uuid": "a4730714-e81f-4b46-b6cb-2eed4c3cea44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114048796379381479", "content": "", "creation_timestamp": "2025-02-22T17:48:47.493711Z"}, {"uuid": "897e1a32-1aea-4668-b06b-59c3d0697a68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lis24njeyl2k", "content": "", "creation_timestamp": "2025-02-22T19:21:57.246106Z"}, {"uuid": "2ae0b17a-bae8-4383-b314-a3028cbf2b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lisjo24cv42s", "content": "", "creation_timestamp": "2025-02-23T00:00:09.100680Z"}, {"uuid": "bac679fa-e5c7-4bc2-b566-e4615d350139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26776", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljotiuzw622l", "content": "", "creation_timestamp": "2025-03-06T06:10:45.016916Z"}, {"uuid": "96ac5073-b251-4de9-9ed1-cedf165174f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "633e62ec-49c5-457a-bb54-376ea9607749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:48.000000Z"}, {"uuid": "77585484-7297-4176-8ae3-292b70a8a853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://t.me/cybersecplayground/125", "content": "\ud83d\udea8 Critical Zero-Day in Chaty Pro Plugin \u2013 CVE-2025-26776 \ud83d\udea8\n\n\ud83d\udd34 Severity: 10.0 (Critical)\n\ud83d\udd34 Vulnerability: Unrestricted File Upload\n\ud83d\udd34 Impact: Full website takeover via malicious file execution\n\n\u26a0\ufe0f What\u2019s the Risk?\nThe Chaty Pro Plugin is affected by a dangerous file upload vulnerability, allowing attackers to:\n\ud83d\udd25 Upload and execute malicious PHP scripts\n\ud83d\udd25 Gain remote access &amp; escalate privileges\n\ud83d\udd25 Modify or delete website data\n\ud83d\udd25 Deploy web shells for persistent control\n\n\ud83d\udd0d How to Detect Affected Sites?\n\ud83d\udd17 Netlas.io\n\ud83d\udc49\ud83c\udffb Query : http.body:\"plugins/chaty-pro\"\n\n\n\ud83d\udca1 Manual Check:\n1\ufe0f\u20e3 Inspect /wp-content/uploads/chaty/ for suspicious files\n2\ufe0f\u20e3 Review server logs for unexpected file upload activity\n3\ufe0f\u20e3 Ensure the plugin is updated to the latest patched version\n\n\ud83d\ude80 Mitigation Steps\n\u2705 Update Chaty Pro Plugin to the latest security patch\n\u2705 Restrict file upload permissions (only allow safe file types)\n\u2705 Monitor /uploads/ directory for unauthorized files\n\u2705 Implement a Web Application Firewall (WAF)\n\n\ud83d\udcf0 Stay Tuned for more information and poc\n\n\ud83d\udce2 Protect your website today! Join us \ud83d\udc49 @cybersecplayground\n\n#WordPress #ChatyPro #CyberSecurity #WebSecurity #Pentesting", "creation_timestamp": "2025-03-06T23:30:03.000000Z"}]}