{"vulnerability": "cve-2025-3593", "sightings": [{"uuid": "36905015-e081-4a1f-aaaa-63356775b8e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://t.me/cvedetector/24784", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-35939 - Craft CMS Unauthenticated Session File Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-35939 \nPublished : May 7, 2025, 11:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at `/var/lib/php/sessions`. Such session files are named `sess_[session_value]`, where `[session_value]` is provided to the client in a `Set-Cookie` response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T03:23:24.000000Z"}, {"uuid": "e88c25ee-fe34-4f59-9a16-15edc604dee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3593", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lmsnh2zzce2c", "content": "", "creation_timestamp": "2025-04-14T22:48:34.454608Z"}, {"uuid": "b97d0138-ae1a-4843-bac8-0b1b072d9efb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3593", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmt2bk6tu42l", "content": "", "creation_timestamp": "2025-04-15T02:38:07.623873Z"}, {"uuid": "61c3061f-d81b-4beb-ab99-d76145efa601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4135365", "content": "", "creation_timestamp": "2025-06-02T17:59:17.845906Z"}, {"uuid": "0f1b6250-3b82-4e1b-a36f-e61767235e61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomkcu27baz2", "content": "", "creation_timestamp": "2025-05-07T23:30:24.343531Z"}, {"uuid": "9af3f999-9177-48c7-95a8-c16cc4f8a792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomnooe7my2l", "content": "", "creation_timestamp": "2025-05-08T00:27:20.485740Z"}, {"uuid": "83045883-95b4-4923-b89c-502fbde0dc20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3593", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11754", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3593\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0. It has been declared as critical. This vulnerability affects the function Upload of the file /admin/upload/authorImg/. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-04-14T22:31:04.528Z\n\ud83d\udccf Modified: 2025-04-15T03:07:55.446Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.304648\n2. https://vuldb.com/?ctiid.304648\n3. https://vuldb.com/?submit.550912\n4. https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/My-Blog-layui-fileUpload.md", "creation_timestamp": "2025-04-15T03:54:35.000000Z"}, {"uuid": "e584e485-98ad-481d-9012-fbfeaaaf9dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15462", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-35939\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at `/var/lib/php/sessions`. Such session files are named `sess_[session_value]`, where `[session_value]` is provided to the client in a `Set-Cookie` response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.\n\ud83d\udccf Published: 2025-05-07T22:41:29.728Z\n\ud83d\udccf Modified: 2025-05-07T22:41:29.728Z\n\ud83d\udd17 References:\n1. https://github.com/craftcms/cms/pull/17220\n2. https://github.com/craftcms/cms/releases/tag/4.15.3\n3. https://github.com/craftcms/cms/releases/tag/5.7.5", "creation_timestamp": "2025-05-07T23:23:32.000000Z"}, {"uuid": "b5d03a80-d5ac-4123-a9da-7a22c467194c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3593", "type": "seen", "source": "https://t.me/cvedetector/22901", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3593 - ZHENFENG13 My-Blog-layui Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3593 \nPublished : April 14, 2025, 11:15 p.m. | 1\u00a0hour, 34\u00a0minutes ago \nDescription : A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0. It has been declared as critical. This vulnerability affects the function Upload of the file /admin/upload/authorImg/. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T03:13:14.000000Z"}, {"uuid": "344c660c-c5be-4f4f-9a37-d34f8c77a968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lqq6sx4aqa22", "content": "", "creation_timestamp": "2025-06-03T21:02:18.584665Z"}, {"uuid": "8c2d0184-3d17-4e48-9633-25bc18d1e4a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "7513447b-1ded-4f3f-ab6d-588840f8a6a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:18.000000Z"}, {"uuid": "57204736-b049-4cd7-a4ef-288b11738db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f495a171-40e0-4d88-8eb6-38045d33001b", "content": "", "creation_timestamp": "2026-02-02T12:26:00.058821Z"}, {"uuid": "b0298f07-7258-4fdc-8f56-6c8fc2b953d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f495a171-40e0-4d88-8eb6-38045d33001b", "content": "", "creation_timestamp": "2026-02-02T12:26:00.058821Z"}, {"uuid": "36adff32-18b8-42df-9ae0-b6ae3d5af5aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-35939", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/204", "content": "", "creation_timestamp": "2025-12-05T22:04:30.000000Z"}]}