{"vulnerability": "cve-2025-2686", "sightings": [{"uuid": "8cf91ebd-8114-4aaf-931f-2f8f2f44a56b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2686", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll4kmpmqgb2j", "content": "", "creation_timestamp": "2025-03-24T10:34:20.995698Z"}, {"uuid": "def49b94-727b-4726-a4b4-2310a7e86c61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljzv7jwmfl2m", "content": "", "creation_timestamp": "2025-03-10T15:40:37.668983Z"}, {"uuid": "cb5da86a-4a6f-486a-9019-23348b04067a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26864", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/142", "content": "", "creation_timestamp": "2025-05-14T00:51:02.000000Z"}, {"uuid": "806c3b49-a9da-4e57-957f-bab416a32e3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "5af716ee-4f1c-49e7-9791-af12680fce1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26866", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m7krjwqpdi2y", "content": "", "creation_timestamp": "2025-12-09T14:39:08.879877Z"}, {"uuid": "9d81072e-c49d-4bca-932f-d6cefb4ae185", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26866", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/255", "content": "", "creation_timestamp": "2025-12-09T13:29:50.000000Z"}, {"uuid": "67281467-0845-48cc-98ec-6c9ba582349e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2686", "type": "seen", "source": "https://t.me/cvedetector/20937", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2686 - Mingyuefusu Tushuguanlixitong Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2686 \nPublished : March 24, 2025, 6:15 a.m. | 43\u00a0minutes ago \nDescription : A vulnerability has been found in mingyuefusu \u660e\u6708\u590d\u82cf tushuguanlixitong \u56fe\u4e66\u7ba1\u7406\u7cfb\u7edf up to d4836f6b49cd0ac79a4021b15ce99ff7229d4694 and classified as critical. Affected by this vulnerability is the function doFilter of the file /admin/ of the component Backend. The manipulation of the argument Request leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T08:22:00.000000Z"}, {"uuid": "ebacd183-a347-4e48-86f7-e047653c4477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://t.me/CyberBulletin/2600", "content": "\u26a1CVE-2025-26865: Apache OFBiz Vulnerability Could Lead to Remote Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2025-03-12T14:27:51.000000Z"}, {"uuid": "2747db47-2ffa-4012-bbd7-e10d673cb606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lk62sukfi22t", "content": "", "creation_timestamp": "2025-03-12T07:31:33.699484Z"}, {"uuid": "0106ffff-1f55-4486-a06f-3b913f759a7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk63teyses2k", "content": "", "creation_timestamp": "2025-03-12T07:49:46.918724Z"}, {"uuid": "8f216d45-6401-495a-8eab-9c84504d9c21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26864", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp4tx3jml4v2", "content": "", "creation_timestamp": "2025-05-14T11:02:37.900953Z"}, {"uuid": "2c165726-8611-4cf9-b25e-2168a78ebee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26864", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lp4yxll2tw2t", "content": "", "creation_timestamp": "2025-05-14T12:31:40.997185Z"}, {"uuid": "5e619b44-7bac-4393-9c39-aa6875a4567a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26861", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m37q5v73k22s", "content": "", "creation_timestamp": "2025-10-15T07:34:27.711335Z"}, {"uuid": "c362a700-663b-4469-9849-e9081cb4b15c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7004", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26865\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: from 18.12.17 before 18.12.18.\u00a0\u00a0\n\nIt's a regression between 18.12.17 and 18.12.18.\nIn case you use something like that, which is not recommended!\nFor security, only official releases should be used.\n\nIn other words, if you use 18.12.17 you are still safe.\nThe version 18.12.17 is not a affected.\nBut something between 18.12.17 and 18.12.18 is.\n\nIn that case, users are recommended to upgrade to version 18.12.18, which fixes the issue.\n\ud83d\udccf Published: 2025-03-10T14:01:06.952Z\n\ud83d\udccf Modified: 2025-03-10T14:03:22.308Z\n\ud83d\udd17 References:\n1. https://ofbiz.apache.org/download.html\n2. https://ofbiz.apache.org/security.html\n3. https://issues.apache.org/jira/browse/OFBIZ-12594\n4. https://lists.apache.org/thread/prb48ztk01bflyyjbl6p56wlcc1n5sz7", "creation_timestamp": "2025-03-10T14:38:50.000000Z"}, {"uuid": "00c1eb28-8cff-423c-8e4c-6851372a9b0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "published-proof-of-concept", "source": "Telegram/P5LDm3S4VTfGYBgu3ytMcEur8FEGyy2Co8KdeMUu5EMrSc8", "content": "", "creation_timestamp": "2025-04-11T23:00:05.000000Z"}, {"uuid": "9122b6c2-5e8f-4c8b-a42e-c5ad56fef6fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26865", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk5toqjwn22i", "content": "", "creation_timestamp": "2025-03-12T05:23:57.087802Z"}, {"uuid": "992f58a9-5860-4502-a98b-7f1267125fcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114138931406443712", "content": "", "creation_timestamp": "2025-03-10T15:51:18.778295Z"}, {"uuid": "c54833a0-5ffe-456f-85b7-fea3c75682e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26866", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ef7f81b665bf7fe18cee59b28bac8cf7", "content": "", "creation_timestamp": "2025-12-12T10:01:24.000000Z"}, {"uuid": "4cf814f7-5960-4fd6-9369-0365f7a2ea75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26866", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5c5db614cb9751705169d821864c4c76", "content": "", "creation_timestamp": "2025-12-12T11:16:41.000000Z"}, {"uuid": "734d71e2-f83f-4150-a279-91813612273b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26866", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7rxsv5ea72o", "content": "", "creation_timestamp": "2025-12-12T11:20:10.145285Z"}, {"uuid": "fb6da1df-2ebb-4383-8024-dac81068f41f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26864", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16298", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26864\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Information into Log File vulnerability in the OpenIdAuthorizer of Apache IoTDB.\n\nThis issue affects Apache IoTDB: from 0.10.0 through 1.3.3, from 2.0.1-beta before 2.0.2.\n\nUsers are recommended to upgrade to version 1.3.4 and 2.0.2, which fix the issue.\n\ud83d\udccf Published: 2025-05-14T10:44:12.712Z\n\ud83d\udccf Modified: 2025-05-14T11:04:06.072Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/2kcjnlypppk8qjh17dpz0jvkcpn6l162", "creation_timestamp": "2025-05-14T11:31:19.000000Z"}, {"uuid": "432a31a6-f127-49f5-a253-98a5f7fc8b5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://t.me/cvedetector/19957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26865 - Apache OFBiz Template Engine Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26865 \nPublished : March 10, 2025, 2:15 p.m. | 57\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.  \n  \nThis issue affects Apache OFBiz: from 18.12.17 before 18.12.18.\u00a0\u00a0  \n  \nIt's a regression between 18.12.17 and 18.12.18.  \nIn case you use something like that, which is not recommended!  \nFor security, only official releases should be used.  \n  \nIn other words, if you use 18.12.17 you are still safe.  \nThe version 18.12.17 is not a affected.  \nBut something between 18.12.17 and 18.12.18 is.  \n  \nIn that case, users are recommended to upgrade to version 18.12.18, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T16:31:54.000000Z"}]}