{"vulnerability": "cve-2025-2737", "sightings": [{"uuid": "0addbf9c-aa88-44c1-8566-105da6cbd6c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27378", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mcxzpe5az52v", "content": "", "creation_timestamp": "2026-01-22T01:25:32.327359Z"}, {"uuid": "6d719809-92c2-48f5-98d8-c057a6dfc5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27377", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mcy275dade2g", "content": "", "creation_timestamp": "2026-01-22T01:34:21.642418Z"}, {"uuid": "54c0e8f9-1b0d-47ee-a6b1-a4a4a7071485", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27378", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mcydoyxvz32n", "content": "", "creation_timestamp": "2026-01-22T04:24:17.503688Z"}, {"uuid": "48a473e5-5424-4271-ad2a-e5be5412c894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27371", "type": "seen", "source": "https://t.me/cvedetector/19403", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27371 - OAuth 2.0 JWT Profile Audience Ambiguity in IETF Specifications (Vendor) - Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-27371 \nPublished : March 3, 2025, 6:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : In certain IETF OAuth 2.0-related specifications, when the JSON Web Token Profile for OAuth 2.0 Client Authentication mechanism is used, there are ambiguities in the audience values of JWTs sent to authorization servers. The affected RFCs may include RFC 7523, and also RFC 7521, RFC 7522, RFC 9101 (JAR), and RFC 9126 (PAR). \nSeverity: 6.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T21:24:45.000000Z"}, {"uuid": "3a89e091-76a8-4d1a-9b23-674d05ac5cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27371", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6247", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27371\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N)\n\ud83d\udd39 Description: In certain IETF OAuth 2.0-related specifications, when the JSON Web Token Profile for OAuth 2.0 Client Authentication mechanism is used, there are ambiguities in the audience values of JWTs sent to authorization servers. The affected RFCs may include RFC 7523, and also RFC 7521, RFC 7522, RFC 9101 (JAR), and RFC 9126 (PAR).\n\ud83d\udccf Published: 2025-03-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-03T18:16:55.266Z\n\ud83d\udd17 References:\n1. https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf\n2. https://openid.net/notice-of-a-security-vulnerability/\n3. https://talks.secworkshop.events/osw2025/talk/R8D9BS/", "creation_timestamp": "2025-03-03T18:35:12.000000Z"}, {"uuid": "b14d7eea-c74a-4a73-b0e2-b9991d49fdf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27370", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6246", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27370\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N)\n\ud83d\udd39 Description: OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client.\n\ud83d\udccf Published: 2025-03-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-03T18:18:11.423Z\n\ud83d\udd17 References:\n1. https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf\n2. https://openid.net/notice-of-a-security-vulnerability/\n3. https://talks.secworkshop.events/osw2025/talk/R8D9BS/", "creation_timestamp": "2025-03-03T18:35:11.000000Z"}, {"uuid": "f6c5faef-164a-4496-865c-ebc9be5c9669", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2737", "type": "seen", "source": "https://t.me/cvedetector/21060", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2737 - PHPGurukul Old Age Home Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2737 \nPublished : March 25, 2025, 6:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Old Age Home Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/contactus.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T09:27:35.000000Z"}, {"uuid": "3ce7acde-a1a1-4844-bda0-9ee1235f7198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27371", "type": "seen", "source": "Telegram/-BdFIpUQUvUNhYymkrfAA4jju_CY31isIq0PwsaHz7c8vPS4", "content": "", "creation_timestamp": "2025-03-08T04:35:52.000000Z"}, {"uuid": "ae56e76e-5e12-4111-ba7a-509cc3168b2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27370", "type": "seen", "source": "Telegram/p0ZA79rNV0nVC7JMwAVemr8zvuA9NF_AFdtiHXgESI3p_ybk", "content": "", "creation_timestamp": "2025-03-08T04:35:51.000000Z"}, {"uuid": "b480b8bb-1412-4fa2-a8df-8e56d0f2b37a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2737", "type": "published-proof-of-concept", "source": "Telegram/iQNXtFYOmWcRpTuzCMi1YOkdI6G4t6sPIp-48nspyrGoFkg", "content": "", "creation_timestamp": "2025-03-25T07:00:53.000000Z"}, {"uuid": "e4294c08-ddc9-4e3f-94b1-7e403919f5fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2737", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll6va3j5jo2w", "content": "", "creation_timestamp": "2025-03-25T08:49:31.884343Z"}, {"uuid": "542a4869-0c46-45f7-afa7-d95986d8d9ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27370", "type": "seen", "source": "https://t.me/cvedetector/19402", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27370 - OpenID Connect Core through errata set 2 Audience Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27370 \nPublished : March 3, 2025, 6:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client. \nSeverity: 6.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T21:24:44.000000Z"}, {"uuid": "4edc4f47-f848-46cf-a358-6a4e71c11b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27370", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13447", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27370\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N)\n\ud83d\udd39 Description: OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client.\n\ud83d\udccf Published: 2025-03-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T14:43:40.581Z\n\ud83d\udd17 References:\n1. https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf\n2. https://openid.net/notice-of-a-security-vulnerability/\n3. https://talks.secworkshop.events/osw2025/talk/R8D9BS/\n4. https://github.com/OWASP/ASVS/issues/2678\n5. https://eprint.iacr.org/2025/629", "creation_timestamp": "2025-04-25T15:07:47.000000Z"}, {"uuid": "a213e867-573c-4092-86e6-a7ad753cf2e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27370", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114100193525391284", "content": "", "creation_timestamp": "2025-03-03T19:39:46.022523Z"}, {"uuid": "59b4be2e-0116-4400-9032-64750ec969af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27371", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114100193525391284", "content": "", "creation_timestamp": "2025-03-03T19:39:46.076763Z"}, {"uuid": "12971214-4ee7-41a0-a30a-51f995691476", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27371", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljit7b4kzj2i", "content": "", "creation_timestamp": "2025-03-03T20:49:28.502320Z"}]}