{"vulnerability": "cve-2025-3167", "sightings": [{"uuid": "3cef095d-c1ae-40c1-ae07-451729dbcb6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31672", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "ad8e4dcb-801d-4d4a-9410-5b6b3b5776fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31674", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10279", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31674\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Drupal Drupal core allows Object Injection.This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3.\n\ud83d\udccf Published: 2025-03-31T21:34:53.144Z\n\ud83d\udccf Modified: 2025-04-03T17:18:14.624Z\n\ud83d\udd17 References:\n1. https://www.drupal.org/sa-core-2025-003", "creation_timestamp": "2025-04-03T17:35:35.000000Z"}, {"uuid": "d883bc17-aefe-4118-9138-6e748a4def7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31672", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11043", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31672\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.\nThis issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.\nUsers are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read  https://poi.apache.org/security.html  for recommendations about how to use the POI libraries securely.\n\ud83d\udccf Published: 2025-04-09T11:59:33.900Z\n\ud83d\udccf Modified: 2025-04-09T12:05:38.677Z\n\ud83d\udd17 References:\n1. https://bz.apache.org/bugzilla/show_bug.cgi?id=69620\n2. https://lists.apache.org/thread/k14w8vcjqy4h34hh5kzldko78kpylkq5", "creation_timestamp": "2025-04-09T12:47:57.000000Z"}, {"uuid": "f5072a19-759e-4006-a1bf-b382004640d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31676", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18892", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31676\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Weak Authentication vulnerability in Drupal Email TFA allows Brute Force.This issue affects Email TFA: from 0.0.0 before 2.0.3.\n\ud83d\udccf Published: 2025-03-31T21:36:58.560Z\n\ud83d\udccf Modified: 2025-06-19T22:42:50.725Z\n\ud83d\udd17 References:\n1. https://www.drupal.org/sa-contrib-2025-001", "creation_timestamp": "2025-06-19T23:40:25.000000Z"}, {"uuid": "ce236854-ea31-4e6a-a6f3-765b3ec50151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3167", "type": "seen", "source": "https://t.me/cvedetector/22010", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3167 - Tenda API Interface Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3167 \nPublished : April 3, 2025, 5:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in Tenda AC23 16.03.07.52. This issue affects some unknown processing of the file /goform/VerAPIMant of the component API Interface. The manipulation of the argument getuid leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T21:55:45.000000Z"}, {"uuid": "ec05d39e-a5b9-4b3c-ad82-9fd6c5ebe3fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31679", "type": "seen", "source": "https://t.me/cvedetector/21675", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31679 - Drupal Ignition Error Pages Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-31679 \nPublished : March 31, 2025, 10:15 p.m. | 51\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Ignition Error Pages allows Cross-Site Scripting (XSS).This issue affects Ignition Error Pages: from 0.0.0 before 1.0.4. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T01:54:47.000000Z"}, {"uuid": "7ff174b9-9fd3-4b24-9777-c0c7969c956d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31677", "type": "seen", "source": "https://t.me/cvedetector/21674", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31677 - Drupal AI CSRF\", \n  \"Content\": \"CVE ID : CVE-2025-31677 \nPublished : March 31, 2025, 10:15 p.m. | 51\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Drupal AI (Artificial Intelligence) allows Cross Site Request Forgery.This issue affects AI (Artificial Intelligence): from 1.0.0 before 1.0.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T01:54:46.000000Z"}, {"uuid": "d7bda7fd-3713-42bd-ad74-56b4c6c09967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31678", "type": "seen", "source": "https://t.me/cvedetector/21676", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31678 - Drupal AI Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31678 \nPublished : March 31, 2025, 10:15 p.m. | 51\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Drupal AI (Artificial Intelligence) allows Forceful Browsing.This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.0.3. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T01:54:48.000000Z"}, {"uuid": "affa86e4-8e55-4213-8759-4096dfd35bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31672", "type": "seen", "source": "https://t.me/cvedetector/22560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31672 - Apache POI OOXML Duplicate Zip Entry Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31672 \nPublished : April 9, 2025, 12:15 p.m. | 2\u00a0hours ago \nDescription : Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.  \nThis issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.  \nUsers are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read    for recommendations about how to use the POI libraries securely. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T16:46:26.000000Z"}, {"uuid": "4a10d8b5-5557-45bc-8d65-b9904a8deba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31674", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3llpfyslgte2s", "content": "", "creation_timestamp": "2025-03-31T22:32:09.659834Z"}, {"uuid": "5ce6154f-584e-4180-839f-b0c589b1d87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31672", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmciknqzjh2r", "content": "", "creation_timestamp": "2025-04-08T12:38:30.609372Z"}]}