{"vulnerability": "cve-2025-46661", "sightings": [{"uuid": "b1dea0c9-bac1-46e4-85ac-b9d25a388fb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46661", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/16546", "content": "\ud83d\udea8IPW Systems Metazo Vulnerability (CVE-2025-46661) Leads to Remote Code Execution via Template Injection\n\nCVSS: 10\n\nhttps://darkwebinformer.com/ipw-systems-metazo-vulnerability-cve-2025-46661-leads-to-remote-code-execution-via-template-injection/", "creation_timestamp": "2025-04-28T18:27:15.000000Z"}, {"uuid": "fac7c2c1-b782-4578-b478-b5cebcdd7ef0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46661", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnuvd7x4ke2a", "content": "", "creation_timestamp": "2025-04-28T13:40:09.788527Z"}, {"uuid": "07af83be-8852-422a-88b5-10c18bf231db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46661", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114416374724829885", "content": "", "creation_timestamp": "2025-04-28T15:48:50.642670Z"}, {"uuid": "46f63b18-39ae-447b-b821-3d7675fafc56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-46661", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114416525144211897", "content": "", "creation_timestamp": "2025-04-28T16:27:03.100109Z"}, {"uuid": "4e30acf5-9775-47eb-81ac-3d4b896f1d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46661", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.com/post/3lnv6ntrds22g", "content": "", "creation_timestamp": "2025-04-28T16:27:12.389504Z"}, {"uuid": "85d8c476-a1c9-4d0e-822d-42a0b2268fa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46661", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnvvm6qvwd2i", "content": "", "creation_timestamp": "2025-04-28T23:17:47.000879Z"}, {"uuid": "501c6a96-9f5c-4089-aa8d-29b0c5f0d8d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46661", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13682", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46661\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection. All instances have been patched by the Supplier.\n\ud83d\udccf Published: 2025-04-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-28T13:13:09.272Z\n\ud83d\udd17 References:\n1. https://code-white.com/public-vulnerability-list/\n2. https://www.ipwsystems.com/", "creation_timestamp": "2025-04-28T14:10:49.000000Z"}, {"uuid": "55fc2376-96c4-4c90-9654-35424a37cf77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46661", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_News/3557", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: IPW Systems Metazo Vulnerability (CVE-2025-46661) Leads to Remote Code Execution via Template Injection\nLink: https://darkwebinformer.com/ipw-systems-metazo-vulnerability-cve-2025-46661-leads-to-remote-code-execution-via-template-injection/", "creation_timestamp": "2025-04-28T16:27:22.000000Z"}, {"uuid": "75f12eb6-3563-4ea1-9112-2224764d7d96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46661", "type": "seen", "source": "https://t.me/cvedetector/23910", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46661 - IPW Systems Metazo Server-Side Template-Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46661 \nPublished : April 28, 2025, 1:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection. All instances have been patched by the Supplier. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T17:24:25.000000Z"}]}