{"vulnerability": "cve-2025-2709", "sightings": [{"uuid": "d205a555-28f2-4d72-a380-49f5254b868b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2709", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8529", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2709\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in Yonyou UFIDA ERP-NC 5.0 and classified as problematic. This vulnerability affects unknown code of the file /login.jsp. The manipulation of the argument key/redirect leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-24T20:00:11.432Z\n\ud83d\udccf Modified: 2025-03-24T20:00:11.432Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300730\n2. https://vuldb.com/?ctiid.300730\n3. https://vuldb.com/?submit.517305\n4. https://github.com/Hebing123/cve/issues/84", "creation_timestamp": "2025-03-24T20:23:46.000000Z"}, {"uuid": "4b494cae-6ed6-47cc-a272-e7a6f5e22c8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27095", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9680", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27095\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18.\n\ud83d\udccf Published: 2025-03-31T15:08:20.942Z\n\ud83d\udccf Modified: 2025-03-31T15:08:20.942Z\n\ud83d\udd17 References:\n1. https://github.com/jumpserver/jumpserver/security/advisories/GHSA-5q9w-f4wh-f535", "creation_timestamp": "2025-03-31T15:31:18.000000Z"}, {"uuid": "931f3a2a-cc54-4142-b506-d19a2ef5e029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://t.me/DarkWebInformer_News/1018", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: CVE-2025-27091: OpenH264 Decoding Functions Heap Overflow Vulnerability\nLink: https://darkwebinformer.com/cve-2025-27091-openh264-decoding-functions-heap-overflow-vulnerability/", "creation_timestamp": "2025-02-20T19:30:28.000000Z"}, {"uuid": "f2eba248-3aca-4946-8a24-99d05d6db3a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27090", "type": "exploited", "source": "https://t.me/suboxone_chatroom/7446", "content": "\ud83d\udc7b\ud83d\udc7b\ud83d\udc7bSSRF in Sliver C2 (CVE-2025-27090), allowing an attacker to read and write TCP traffic through affected teamservers. \n\n\ud83d\udd25\ud83d\udd25\ud83d\udd25Demo shows leaking the IP of a Sliver teamserver hidden behind redirectors.\n\nWriteup- https://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2/\n\nPOC- https://github.com/chebuya/exploits/tree/main/CVE-2025-27090%3A%20Sliver%20C2%20SSRF", "creation_timestamp": "2025-04-01T14:48:40.000000Z"}, {"uuid": "e1efb635-e5a8-4592-a559-bc9548f5160d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2709", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll5t67mmxa2w", "content": "", "creation_timestamp": "2025-03-24T22:39:56.397316Z"}, {"uuid": "a7bfc813-3646-41ae-85dd-a33d71ec78ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/will.willofmiletus.com/post/3lil4zhtabk2d", "content": "", "creation_timestamp": "2025-02-20T01:25:14.276048Z"}, {"uuid": "0970dd2c-c18e-42bc-8f8b-d3324245a35b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lild2otmvu24", "content": "", "creation_timestamp": "2025-02-20T03:13:17.095895Z"}, {"uuid": "b66ce05a-1e6b-4210-b6cf-f9257ae8c093", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lild2ovqgo2u", "content": "", "creation_timestamp": "2025-02-20T03:13:17.614110Z"}, {"uuid": "7043ea09-9842-4a1e-9557-d75f2161c03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lild2pw5go26", "content": "", "creation_timestamp": "2025-02-20T03:13:19.088562Z"}, {"uuid": "c8ea38c6-d6f5-47e8-bf10-b6ff66ccce60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lild2uy63n2q", "content": "", "creation_timestamp": "2025-02-20T03:13:23.242719Z"}, {"uuid": "9023eba4-8e6e-4807-adcf-2a86491913e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lildxans362u", "content": "", "creation_timestamp": "2025-02-20T03:29:15.373318Z"}, {"uuid": "30e54b65-a691-4248-95d5-273ea7bf32ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lildxappls26", "content": "", "creation_timestamp": "2025-02-20T03:29:15.940536Z"}, {"uuid": "71b870d1-2844-458b-9435-b4bfa0d6ea72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lildxbqjfy2q", "content": "", "creation_timestamp": "2025-02-20T03:29:17.374054Z"}, {"uuid": "c17ba7dc-1ae9-4131-93df-085ef252192b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lildxerujh24", "content": "", "creation_timestamp": "2025-02-20T03:29:19.608322Z"}, {"uuid": "627b3f5e-a05c-4549-8b49-ae75f3333aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lilenvdr7b2q", "content": "", "creation_timestamp": "2025-02-20T03:41:55.316207Z"}, {"uuid": "813886e7-819a-4f52-b3b5-ddde60cbffd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lilepoqoda2k", "content": "", "creation_timestamp": "2025-02-20T03:42:55.192076Z"}, {"uuid": "b083b70f-7137-40bd-9f9e-35ca37fadd53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lileri4nni2n", "content": "", "creation_timestamp": "2025-02-20T03:43:55.412203Z"}, {"uuid": "5ad18603-3f5c-4260-ad93-6a5f2ae1c4f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lilewulsv22j", "content": "", "creation_timestamp": "2025-02-20T03:46:56.252150Z"}, {"uuid": "e56807ef-5473-4291-8553-d37b5ed44d0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lilf3a6b5o2e", "content": "", "creation_timestamp": "2025-02-20T03:49:22.631102Z"}, {"uuid": "3cf3502f-059a-4360-809f-1b226f6ae2d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lilf3a7x2h2t", "content": "", "creation_timestamp": "2025-02-20T03:49:23.180844Z"}, {"uuid": "3ddb7c44-ba14-48c3-bc6f-46ca504e3ab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lilf3ba7bp2t", "content": "", "creation_timestamp": "2025-02-20T03:49:24.326586Z"}, {"uuid": "2691d753-f8b1-4666-8188-58eb6918c7b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/vulns.bsky.social/post/3lilf3eb5z32k", "content": "", "creation_timestamp": "2025-02-20T03:49:26.948485Z"}, {"uuid": "c9b08205-9702-4eda-b7d8-25fa744b0fca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27091", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lj2xkkj6xs2b", "content": "", "creation_timestamp": "2025-02-26T08:30:00.662041Z"}, {"uuid": "423bfdbd-788b-48a8-8e24-f0b3d8557a29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27095", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llzpt5vcvc2g", "content": "", "creation_timestamp": "2025-04-05T00:54:36.882964Z"}, {"uuid": "85d5b620-6fbf-418a-9be4-69118e85790e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2709", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-2709.yaml", "content": "", "creation_timestamp": "2025-07-16T13:27:37.000000Z"}, {"uuid": "528a6c2f-2399-44c6-9f46-36bc83dcd4e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27093", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115587896765175745", "content": "", "creation_timestamp": "2025-11-21T13:22:15.428201Z"}, {"uuid": "3d73643f-5a4a-4087-a6c7-1d4475cfe68d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27093", "type": "seen", "source": "https://infosec.exchange/users/r1cksec/statuses/115615186636747982", "content": "", "creation_timestamp": "2025-11-26T09:35:46.640986Z"}, {"uuid": "27840297-2762-49fe-9313-7f8b073d4510", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27094", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}, {"uuid": "6414ebe3-6d21-4850-a849-510e81dc1676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27096", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "fce4ca3d-b681-49a0-b308-b335f49992b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "e1d90890-0135-476e-80ef-90b4473f71c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://t.me/cvedetector/18587", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27091 - Cisco OpenH264 Heap Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27091 \nPublished : Feb. 20, 2025, 6:15 p.m. | 1\u00a0hour, 21\u00a0minutes ago \nDescription : OpenH264 is a free license codec library which supports H.264 encoding and decoding. A vulnerability in the decoding functions of OpenH264 codec library could allow a remote, unauthenticated attacker to trigger a heap overflow. This vulnerability is due to a race condition between a Sequence Parameter Set (SPS) memory allocation and a subsequent non Instantaneous Decoder Refresh (non-IDR) Network Abstraction Layer (NAL) unit memory usage. An attacker could exploit this vulnerability by crafting a malicious bitstream and tricking a victim user into processing an arbitrary video containing the malicious bistream. An exploit could allow the attacker to cause an unexpected crash in the victim's user decoding client and, possibly, perform arbitrary commands on the victim's host by abusing the heap overflow. This vulnerability affects OpenH264 2.5.0 and earlier releases. Both Scalable Video Coding (SVC) mode and Advanced Video Coding (AVC) mode are affected by this vulnerability. OpenH264 software releases 2.6.0 and later contained the fix for this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.  \n  \n### For more information  \n  \nIf you have any questions or comments about this advisory:  \n* [Open an issue in cisco/openh264]()  \n* Email Cisco Open Source Security ([oss-security@cisco.com](mailto:oss-security@cisco.com)) and Cisco PSIRT ([psirt@cisco.com](mailto:psirt@cisco.com))  \n  \n### Credits:  \n  \n* **Research:** Octavian Guzu and Andrew Calvano of Meta  \n* **Fix ideation:** Philipp Hancke and Shyam Sadhwani of Meta  \n* **Fix implementation:** Benzheng Zhang (@BenzhengZhang)  \n* **Release engineering:** Benzheng Zhang (@BenzhengZhang) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T20:41:22.000000Z"}, {"uuid": "c2deba69-610b-4678-8755-6d595c9248ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27098", "type": "seen", "source": "https://t.me/cvedetector/18598", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27098 - GraphQL Mesh File System Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27098 \nPublished : Feb. 20, 2025, 9:15 p.m. | 23\u00a0minutes ago \nDescription : GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. Missing check vulnerability in the static file handler allows any client to access the files in the server's file system. When `staticFiles` is set in the `serve` settings in the configuration file, the following handler doesn't check if `absolutePath` is still under the directory provided as `staticFiles`. Users have two options to fix vulnerability; 1. Update `@graphql-mesh/cli` to a version higher than `0.82.21`, and if you use `@graphql-mesh/http`, update it to a version higher than `0.3.18` 2. Remove `staticFiles` option from the configuration, and use other solutions to serve static files. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T23:12:03.000000Z"}, {"uuid": "82d9854f-cac0-4be6-bab9-5836b1339275", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27097", "type": "seen", "source": "https://t.me/cvedetector/18597", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27097 - GraphQL Mesh Token Persistence Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27097 \nPublished : Feb. 20, 2025, 9:15 p.m. | 23\u00a0minutes ago \nDescription : GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. When a user transforms on the root level or single source with transforms, and the client sends the same query with different variables, the initial variables are used in all following requests until the cache evicts DocumentNode. If a token is sent via variables, the following requests will act like the same token is sent even if the following requests have different tokens. This can cause a short memory leak but it won't grow per each request but per different operation until the cache evicts DocumentNode by LRU mechanism. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T23:12:03.000000Z"}, {"uuid": "87c94d60-4a24-4323-8f32-9af821a45323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27096", "type": "seen", "source": "https://t.me/cvedetector/18577", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27096 - WeGIA Web Manager for Institutions SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27096 \nPublished : Feb. 20, 2025, 7:15 p.m. | 22\u00a0minutes ago \nDescription : WeGIA is a Web Manager for Institutions with a focus on Portuguese language. A SQL Injection vulnerability was discovered in the WeGIA application, personalizacao_upload.php endpoint. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T20:41:09.000000Z"}, {"uuid": "cbf7c0c8-9cf4-41d1-9e3f-26478f158279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27097", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4814", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27097\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. When a user transforms on the root level or single source with transforms, and the client sends the same query with different variables, the initial variables are used in all following requests until the cache evicts DocumentNode. If a token is sent via variables, the following requests will act like the same token is sent even if the following requests have different tokens. This can cause a short memory leak but it won't grow per each request but per different operation until the cache evicts DocumentNode by LRU mechanism.\n\ud83d\udccf Published: 2025-02-20T20:15:53.648Z\n\ud83d\udccf Modified: 2025-02-20T21:01:18.158Z\n\ud83d\udd17 References:\n1. https://github.com/ardatan/graphql-mesh/security/advisories/GHSA-rr4x-crhf-8886", "creation_timestamp": "2025-02-20T21:17:47.000000Z"}, {"uuid": "c1023cff-eb41-4b9b-8a14-c11aee8e1529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27095", "type": "seen", "source": "https://t.me/cvedetector/21623", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27095 - JumpServer Kubernetes Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27095 \nPublished : March 31, 2025, 4:15 p.m. | 48\u00a0minutes ago \nDescription : JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T19:12:32.000000Z"}, {"uuid": "0c18cd6e-0a0c-41b7-8317-db3a06f38716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2709", "type": "seen", "source": "https://t.me/cvedetector/20990", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2709 - Yonyou UFIDA ERP-NC Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2709 \nPublished : March 24, 2025, 8:15 p.m. | 1\u00a0hour, 6\u00a0minutes ago \nDescription : A vulnerability has been found in Yonyou UFIDA ERP-NC 5.0 and classified as problematic. This vulnerability affects unknown code of the file /login.jsp. The manipulation of the argument key/redirect leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T22:35:03.000000Z"}, {"uuid": "0592e771-7eeb-4ff4-bdb0-286656907b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/12948", "content": "\ud83d\udea8 High Security Vulnerability\n\ud83c\udd94 CVE-2025-27092\n\ud83d\udca3 CVSS Score: 8.7\n\ud83d\udcc5 Published Date: 2025-02-19\n\n\u26a0\ufe0f Details: GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. The vulnerability exists in the /api/npcs/{id}/photo endpoint, which is designed to serve profile photos for NPCs (Non-Player Characters) but fails to properly validate and sanitize file paths. When an NPC is created with a specially crafted photoLink value containing path traversal sequences (../, ..\\, etc.), the application processes these sequences without proper sanitization. This allows an attacker to traverse directory structures and access files outside of the intended photo directory, potentially exposing sensitive system files. The vulnerability is particularly severe because it allows reading arbitrary files from the server's filesystem with the permissions of the web application process, which could include configuration files, credentials, or other sensitive data. This issue has been addressed in version 8.2.7.90 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n\ud83d\udee0 References:\n\ud83d\udd17 GitHub 1: https://github.com/cmu-sei/GHOSTS/security/advisories/GHSA-qr67-m6w9-wj3j\n\ud83d\udd17 GitHub 2: https://github.com/cmu-sei/GHOSTS/commit/e69827556a52ff813de00e1017c4b62598d2c887", "creation_timestamp": "2025-02-20T00:07:11.000000Z"}, {"uuid": "ceb706a8-0417-4777-8715-23351bc7afa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27090", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lim5oe2oss2u", "content": "", "creation_timestamp": "2025-02-20T11:09:34.929358Z"}, {"uuid": "9ea10199-1fa9-4b24-85fe-9e88566843ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27090", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3limcrpgqfs27", "content": "", "creation_timestamp": "2025-02-20T12:40:54.954051Z"}, {"uuid": "b55c084f-6d9c-4d17-b0ba-74ad13646613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3limzocusgs2j", "content": "", "creation_timestamp": "2025-02-20T19:30:40.526902Z"}, {"uuid": "7a96ea10-2f8f-41be-ae90-f080a0c50a2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27090", "type": "seen", "source": "https://t.me/cvedetector/18479", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27090 - Sliver Teamserver Unauthenticated Reverse Port Forwarding Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27090 \nPublished : Feb. 19, 2025, 10:15 p.m. | 27\u00a0minutes ago \nDescription : Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. The reverse port forwarding in sliver teamserver allows the implant to open a reverse tunnel on the sliver teamserver without verifying if the operator instructed the implant to do so. The only impact that has been shown is the exposure of the server's IP address to a third party. This issue has been addressed in version 1.5.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T23:46:02.000000Z"}, {"uuid": "fa2360c0-e69a-4d56-b63b-d4ac724889d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/12980", "content": "\ud83d\udea8CVE-2025-27091: OpenH264 Decoding Functions Heap Overflow Vulnerability\n\nhttps://darkwebinformer.com/cve-2025-27091-openh264-decoding-functions-heap-overflow-vulnerability/", "creation_timestamp": "2025-02-20T20:30:28.000000Z"}, {"uuid": "5d0a408f-43aa-4303-b067-35f94ac747e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27096", "type": "seen", "source": "Telegram/q7oCMwcROB1eQLWf1QkZrf90Wa2jidDuhyNqW4Hbthe2J46c", "content": "", "creation_timestamp": "2025-02-20T23:26:56.000000Z"}, {"uuid": "f9228f35-26e4-4ad9-8e25-87fd555cea2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://bsky.app/profile/celenity.dev/post/3ljb3ob5xkc2z", "content": "", "creation_timestamp": "2025-02-28T18:59:39.736947Z"}, {"uuid": "dc751caa-f5d3-4786-82f4-e245b3d4b1dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27094", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljim7h27tx2b", "content": "", "creation_timestamp": "2025-03-03T18:44:12.663179Z"}, {"uuid": "59686656-68d8-45c9-ae8c-962df2860de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27099", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljim7hu3qz2a", "content": "", "creation_timestamp": "2025-03-03T18:44:15.164580Z"}, {"uuid": "51246cde-e86a-40e6-8208-039d398c6b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljgagfhhh22f", "content": "", "creation_timestamp": "2025-03-02T20:08:02.214130Z"}, {"uuid": "d9fd1c7f-fa34-4bfe-a990-82e0e077e458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://bsky.app/profile/it4sec.bsky.social/post/3liozn5i4qs2a", "content": "", "creation_timestamp": "2025-02-21T14:35:18.058929Z"}, {"uuid": "cdd5cdff-869d-400a-aa8a-31ba84fba131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://bsky.app/profile/leekthehack.bsky.social/post/3lip2zw7xmc26", "content": "", "creation_timestamp": "2025-02-21T15:00:23.980575Z"}, {"uuid": "2b3131dd-6b32-4d5c-8821-d8a9c7b45a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27090", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lirw3gqeok2i", "content": "", "creation_timestamp": "2025-02-22T18:09:41.542656Z"}, {"uuid": "9ae7825c-8294-45b0-a9b9-3c221c542a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lj2ij5bhv42p", "content": "", "creation_timestamp": "2025-02-26T04:00:46.523854Z"}, {"uuid": "b8377b36-8895-436f-a43d-cb295a6fda80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lj2tr62pbs2m", "content": "", "creation_timestamp": "2025-02-26T07:22:10.086076Z"}, {"uuid": "e1d698c5-90c8-4502-b68d-13065b07a8f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27095", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llqpdfmwkx2n", "content": "", "creation_timestamp": "2025-04-01T10:51:48.150321Z"}, {"uuid": "a6b00d41-5693-4248-ade7-3f8e327a5714", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "https://gist.github.com/EbonJaeger/94d6b11fee980a997a2d1e6007418f90", "content": "", "creation_timestamp": "2025-06-13T18:04:24.000000Z"}, {"uuid": "4c4073c4-aaef-4197-9e69-06eca058c3fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2709", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lu6tdmcp4d2k", "content": "", "creation_timestamp": "2025-07-17T21:02:30.930766Z"}, {"uuid": "5db9fe6c-b437-4272-b6a8-2e532290026f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27093", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/115593005207563115", "content": "", "creation_timestamp": "2025-11-22T11:01:25.079078Z"}, {"uuid": "8731c8bb-792b-42ac-ad54-0a28da4883ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27093", "type": "seen", "source": "https://threatintel.cc/2025/11/21/sliver-c-insecure-default-network.html", "content": "", "creation_timestamp": "2025-11-21T12:22:30.000000Z"}, {"uuid": "c0819edc-cf38-4041-9edc-2f8333311a9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:30:59.000000Z"}, {"uuid": "0325c0ca-f5d5-4a07-9743-5d5c474131ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27092", "type": "seen", "source": "https://t.me/cvedetector/18497", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27092 - GHOSTS Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27092 \nPublished : Feb. 19, 2025, 11:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. The vulnerability exists in the /api/npcs/{id}/photo endpoint, which is designed to serve profile photos for NPCs (Non-Player Characters) but fails to properly validate and sanitize file paths. When an NPC is created with a specially crafted photoLink value containing path traversal sequences (../, ..\\, etc.), the application processes these sequences without proper sanitization. This allows an attacker to traverse directory structures and access files outside of the intended photo directory, potentially exposing sensitive system files. The vulnerability is particularly severe because it allows reading arbitrary files from the server's filesystem with the permissions of the web application process, which could include configuration files, credentials, or other sensitive data. This issue has been addressed in version 8.2.7.90 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T02:16:43.000000Z"}, {"uuid": "65e870ed-e4e7-44b1-9be8-eec059188954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27096", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4798", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27096\n\ud83d\udd25 CVSS Score: 9.4 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: WeGIA is a Web Manager for Institutions with a focus on Portuguese language. A SQL Injection vulnerability was discovered in the WeGIA application, personalizacao_upload.php endpoint. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-02-20T19:07:43.031Z\n\ud83d\udccf Modified: 2025-02-20T19:07:43.031Z\n\ud83d\udd17 References:\n1. https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j856-wh9m-9vpm", "creation_timestamp": "2025-02-20T19:49:27.000000Z"}, {"uuid": "6b4b7fd9-6731-4ff4-8316-4e6487e48942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27091", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4804", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27091\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: OpenH264 is a free license codec library which supports H.264 encoding and decoding. A vulnerability in the decoding functions of OpenH264 codec library could allow a remote, unauthenticated attacker to trigger a heap overflow. This vulnerability is due to a race condition between a Sequence Parameter Set (SPS) memory allocation and a subsequent non Instantaneous Decoder Refresh (non-IDR) Network Abstraction Layer (NAL) unit memory usage. An attacker could exploit this vulnerability by crafting a malicious bitstream and tricking a victim user into processing an arbitrary video containing the malicious bistream. An exploit could allow the attacker to cause an unexpected crash in the victim's user decoding client and, possibly, perform arbitrary commands on the victim's host by abusing the heap overflow. This vulnerability affects OpenH264 2.5.0 and earlier releases. Both Scalable Video Coding (SVC) mode and Advanced Video Coding (AVC) mode are affected by this vulnerability. OpenH264 software releases 2.6.0 and later contained the fix for this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* [Open an issue in cisco/openh264](https://github.com/cisco/openh264/issues)\n* Email Cisco Open Source Security ([oss-security@cisco.com](mailto:oss-security@cisco.com)) and Cisco PSIRT ([psirt@cisco.com](mailto:psirt@cisco.com))\n\n### Credits:\n\n* **Research:** Octavian Guzu and Andrew Calvano of Meta\n* **Fix ideation:** Philipp Hancke and Shyam Sadhwani of Meta\n* **Fix implementation:** Benzheng Zhang (@BenzhengZhang)\n* **Release engineering:** Benzheng Zhang (@BenzhengZhang)\n\ud83d\udccf Published: 2025-02-20T17:50:03.191Z\n\ud83d\udccf Modified: 2025-02-20T18:40:39.421Z\n\ud83d\udd17 References:\n1. https://github.com/cisco/openh264/security/advisories/GHSA-m99q-5j7x-7m9x\n2. https://github.com/cisco/openh264/releases/tag/v2.6.0", "creation_timestamp": "2025-02-20T19:49:35.000000Z"}, {"uuid": "921d35e1-c970-498a-8d4a-f9cd859a29a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27098", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4811", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27098\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. Missing check vulnerability in the static file handler allows any client to access the files in the server's file system. When `staticFiles` is set in the `serve` settings in the configuration file, the following handler doesn't check if `absolutePath` is still under the directory provided as `staticFiles`. Users have two options to fix vulnerability; 1. Update `@graphql-mesh/cli` to a version higher than `0.82.21`, and if you use `@graphql-mesh/http`, update it to a version higher than `0.3.18` 2. Remove `staticFiles` option from the configuration, and use other solutions to serve static files.\n\ud83d\udccf Published: 2025-02-20T20:13:01.242Z\n\ud83d\udccf Modified: 2025-02-20T21:04:05.183Z\n\ud83d\udd17 References:\n1. https://github.com/ardatan/graphql-mesh/security/advisories/GHSA-j2wh-wrv3-4x4g", "creation_timestamp": "2025-02-20T21:17:42.000000Z"}]}