{"vulnerability": "cve-2025-4547", "sightings": [{"uuid": "1c0e4432-5a76-4a58-9f75-c804a94d3291", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45474", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqdea2r5gz2q", "content": "", "creation_timestamp": "2025-05-29T18:34:26.059978Z"}, {"uuid": "62dba4e5-dae1-4a1c-b16b-9a8a9f7d24d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45475", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq6ndum3hn2m", "content": "", "creation_timestamp": "2025-05-27T21:34:18.798257Z"}, {"uuid": "b4f4cb27-41a2-4076-bba4-57afa8126036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4547", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lowf5polpjg2", "content": "", "creation_timestamp": "2025-05-11T21:21:32.785922Z"}, {"uuid": "7e050fb4-4001-4915-a690-1073b42e8aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4547", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lowqem4mwz2t", "content": "", "creation_timestamp": "2025-05-12T00:41:55.734282Z"}, {"uuid": "db71085d-29a6-402b-98f9-115ffcf47ce8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45475", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17683", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45475\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: maccms10 v2025.1000.4047 is vulnerable to Server-Side request forgery (SSRF) in Friend Link Management.\n\ud83d\udccf Published: 2025-05-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-27T17:41:05.592Z\n\ud83d\udd17 References:\n1. https://www.yuque.com/morysummer/vx41bz/dzidfm8vn2h5k1lb", "creation_timestamp": "2025-05-27T17:48:50.000000Z"}, {"uuid": "1021f18f-0598-4a2c-b8a7-3b6360f9ab5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4547", "type": "seen", "source": "https://t.me/cvedetector/25052", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4547 - SourceCodester Web-based Pharmacy Product Management System Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4547 \nPublished : May 11, 2025, 9:15 p.m. | 27\u00a0minutes ago \nDescription : A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Add User Page. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T00:13:31.000000Z"}, {"uuid": "8058bf03-2e0c-401d-a305-2cdaed76873b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45475", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq6dmzkki5j2", "content": "", "creation_timestamp": "2025-05-27T18:40:33.391149Z"}, {"uuid": "42460aa6-b5ac-4209-a63c-ce36c58bc24f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45474", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqd5vdqpupa2", "content": "", "creation_timestamp": "2025-05-29T16:42:37.860852Z"}, {"uuid": "9e8ea736-59c8-4021-a635-3a540556046e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4547", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16028", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4547\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Add User Page. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected.\n\ud83d\udccf Published: 2025-05-11T21:00:07.162Z\n\ud83d\udccf Modified: 2025-05-12T18:56:07.490Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.308294\n2. https://vuldb.com/?ctiid.308294\n3. https://vuldb.com/?submit.567497\n4. https://github.com/csehacademy/CVEs/blob/main/Web-based%20Pharmacy%20Product%20Management%20System%20-%20Stored%20XSS.md\n5. https://www.sourcecodester.com/", "creation_timestamp": "2025-05-12T19:29:18.000000Z"}]}