{"vulnerability": "cve-2025-3605", "sightings": [{"uuid": "d0c76cba-c8e1-4183-a583-2798a08e9bcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lp5viov2os2i", "content": "", "creation_timestamp": "2025-05-14T21:02:28.691224Z"}, {"uuid": "d84eff4f-f156-4402-80a6-fe286bb86d84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lyqofa7zvr26", "content": "", "creation_timestamp": "2025-09-13T21:02:28.879301Z"}, {"uuid": "92940779-a289-485d-87a0-d01a04d9a9a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlby7pc72z", "content": "", "creation_timestamp": "2025-08-03T21:03:04.973834Z"}, {"uuid": "be76781b-2b54-4452-9d48-545f20fa1ae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-3605.yaml", "content": "", "creation_timestamp": "2025-09-16T23:30:55.000000Z"}, {"uuid": "85750dc8-c9ca-49ee-8086-134144f18a08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15773", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3605\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.7. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the flr_blocks_user_settings_handle_ajax_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.\n\ud83d\udccf Published: 2025-05-09T06:42:34.761Z\n\ud83d\udccf Modified: 2025-05-09T15:43:02.560Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/0c11668c-6dc3-4539-b2be-bf6528bed73e?source=cve\n2. https://plugins.trac.wordpress.org/browser/frontend-login-and-registration-blocks/trunk/inc/class-flr-blocks-user-settings.php#L59", "creation_timestamp": "2025-05-09T16:25:12.000000Z"}, {"uuid": "745f4390-f773-4169-9a23-9059093ac876", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36056", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/20001", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-36056\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM System Storage Virtualization Engine TS7700 3957 VED R5.4 8.54.2.17, R6.0 8.60.0.115, 3948 VED R5.4 8.54.2.17, R6.0 8.60.0.115, and 3948 VEF R6.0 8.60.0.115\u00a0is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-07-01T01:00:03.022Z\n\ud83d\udccf Modified: 2025-07-01T01:00:03.022Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7238555", "creation_timestamp": "2025-07-01T02:07:49.000000Z"}, {"uuid": "34a04365-3c26-4d06-8959-2dbdb1ab3955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "seen", "source": "Telegram/nVjbyWi1OTQqVrCfCpVg9HGjFoxjWvVL_Heny3L18ja2tx5m", "content": "", "creation_timestamp": "2025-06-25T00:39:13.000000Z"}, {"uuid": "0036ae3c-cf35-48d9-acbe-511c5e9678b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "seen", "source": "Telegram/EKi3juhW8KdvSrT-C52NnQYma9e80zcUs_26vGBIli1oz3UL", "content": "", "creation_timestamp": "2025-06-25T17:32:32.000000Z"}, {"uuid": "a3387a94-2068-41af-9fcb-e07f000cbc76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "seen", "source": "https://t.me/cvedetector/24925", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3605 - WordPress Frontend Login and Registration Blocks Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3605 \nPublished : May 9, 2025, 7:16 a.m. | 44\u00a0minutes ago \nDescription : The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.7. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the flr_blocks_user_settings_handle_ajax_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T10:21:51.000000Z"}, {"uuid": "f6c33f8f-436b-484f-b290-2066d51b9556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36050", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18874", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-36050\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM QRadar SIEM 7.5 through 7.5.0 Update Package 12 stores potentially sensitive information in log files that could be read by a local user.\n\ud83d\udccf Published: 2025-06-19T17:13:40.753Z\n\ud83d\udccf Modified: 2025-06-19T17:13:40.753Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7237317", "creation_timestamp": "2025-06-19T17:41:00.000000Z"}, {"uuid": "cdc21b4f-09d5-4836-87bb-ef1a17d50421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "seen", "source": "Telegram/-QOyMiowJoIyiMyTWDmr53uOV1Gxrf1KetOkwLf9_gvu4z0", "content": "", "creation_timestamp": "2025-06-25T00:39:14.000000Z"}, {"uuid": "1694fc5c-982d-47b4-981f-7f6ce9d3263b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3605", "type": "published-proof-of-concept", "source": "Telegram/Fs-71f7EyEUAT9p8cs1pKurUUJNlZKa9KwCGamF1BDnYNo4", "content": "", "creation_timestamp": "2025-05-10T05:00:10.000000Z"}, {"uuid": "ae439362-0b6f-46c6-8d14-6af9956f3981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36050", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrydkl24l42s", "content": "", "creation_timestamp": "2025-06-19T20:13:31.026523Z"}, {"uuid": "315a150f-4f75-4930-9425-4bea3657ade3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36056", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsuuyzjskp2a", "content": "", "creation_timestamp": "2025-07-01T04:40:22.431818Z"}, {"uuid": "1b2a2c43-4b30-4561-88d0-cb245db8036f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-36059", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115929754153566783", "content": "", "creation_timestamp": "2026-01-20T22:21:05.114061Z"}]}