{"vulnerability": "cve-2025-42603", "sightings": [{"uuid": "5df6c3ea-690f-46e6-bb85-6374af9543a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42603", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnibm4dd6z2u", "content": "", "creation_timestamp": "2025-04-23T13:15:16.716470Z"}, {"uuid": "d52f26b6-42e3-4db3-a386-da37aa803742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42603", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13023", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-42603\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N)\n\ud83d\udd39 Description: This vulnerability exists in the Meon KYC solutions due to transmission of sensitive data in plain text within the response payloads of certain API endpoints. An authenticated remote attacker could exploit this vulnerability by intercepting API response that contains unencrypted sensitive information belonging to other users.\n\nSuccessful exploitation of this vulnerability could allow remote attacker to impersonate the target user and gain unauthorized access to the user account.\n\ud83d\udccf Published: 2025-04-23T10:38:49.256Z\n\ud83d\udccf Modified: 2025-04-23T10:38:49.256Z\n\ud83d\udd17 References:\n1. https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&amp;VLCODE=CIVN-2025-0082", "creation_timestamp": "2025-04-23T11:20:48.000000Z"}, {"uuid": "1bcd2126-0af5-410e-936d-b32bc418b1b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42603", "type": "seen", "source": "https://t.me/cvedetector/23582", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-42603 - Meon KYC Plain Text Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-42603 \nPublished : April 23, 2025, 11:15 a.m. | 57\u00a0minutes ago \nDescription : This vulnerability exists in the Meon KYC solutions due to transmission of sensitive data in plain text within the response payloads of certain API endpoints. An authenticated remote attacker could exploit this vulnerability by intercepting API response that contains unencrypted sensitive information belonging to other users.  \n  \nSuccessful exploitation of this vulnerability could allow remote attacker to impersonate the target user and gain unauthorized access to the user account. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T14:28:51.000000Z"}]}