{"vulnerability": "cve-2025-4813", "sightings": [{"uuid": "d14649aa-008e-4daf-bf34-6f6481d3a9c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48134", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48134\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Deserialization of Untrusted Data vulnerability in ShapedPlugin LLC WP Tabs allows Object Injection. This issue affects WP Tabs: from n/a through 2.2.11.\n\ud83d\udccf Published: 2025-05-16T15:45:13.676Z\n\ud83d\udccf Modified: 2025-05-16T16:23:44.285Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-expand-tabs-free/vulnerability/wordpress-wp-tabs-2-2-11-php-object-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T16:34:48.000000Z"}, {"uuid": "9fde21a8-0969-4e6a-b2ce-a42561112460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48137", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16711", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48137\n\ud83d\udd25 CVSS Score: 8.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in proxymis Interview allows SQL Injection. This issue affects Interview: from n/a through 1.01.\n\ud83d\udccf Published: 2025-05-16T15:45:15.297Z\n\ud83d\udccf Modified: 2025-05-16T16:21:37.279Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/interview/vulnerability/wordpress-interview-1-01-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T16:34:58.000000Z"}, {"uuid": "67f17947-5d8b-48e7-9dbc-48d08d889a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48136", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16710", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48136\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Estatik Mortgage Calculator Estatik allows PHP Local File Inclusion. This issue affects Mortgage Calculator Estatik: from n/a through 2.0.12.\n\ud83d\udccf Published: 2025-05-16T15:45:14.748Z\n\ud83d\udccf Modified: 2025-05-16T16:21:53.389Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/estatik-mortgage-calculator/vulnerability/wordpress-mortgage-calculator-estatik-2-0-12-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T16:34:57.000000Z"}, {"uuid": "cd95de03-ef52-4730-b7cc-6ada79f030dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48135", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16709", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48135\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aptivadadev Aptivada for WP allows DOM-Based XSS. This issue affects Aptivada for WP: from n/a through 2.0.0.\n\ud83d\udccf Published: 2025-05-16T15:45:14.238Z\n\ud83d\udccf Modified: 2025-05-16T16:22:07.729Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/aptivada-for-wp/vulnerability/wordpress-aptivada-for-wp-2-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T16:34:56.000000Z"}, {"uuid": "467d056c-a5ac-4557-9b41-91fdeabd0a8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48138", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16712", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48138\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Missing Authorization vulnerability in berthaai BERTHA AI allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects BERTHA AI: from n/a through 1.12.11.\n\ud83d\udccf Published: 2025-05-16T15:45:15.805Z\n\ud83d\udccf Modified: 2025-05-16T16:21:16.888Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/bertha-ai-free/vulnerability/wordpress-bertha-ai-1-12-11-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T16:34:59.000000Z"}, {"uuid": "93c2cd75-c378-45f9-ad56-bce8c33bc8f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48132", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16729", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48132\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pencilwp X Addons for Elementor allows Stored XSS. This issue affects X Addons for Elementor: from n/a through 1.0.14.\n\ud83d\udccf Published: 2025-05-16T15:45:13.127Z\n\ud83d\udccf Modified: 2025-05-16T16:50:14.389Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/x-addons-elementor/vulnerability/wordpress-x-addons-for-elementor-1-0-14-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:34:57.000000Z"}, {"uuid": "319ffeb0-24fd-4b87-99cb-9ff6dd31c6eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48131", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16728", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48131\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saiful Islam UltraAddons Elementor Lite allows Stored XSS. This issue affects UltraAddons Elementor Lite: from n/a through 2.0.0.\n\ud83d\udccf Published: 2025-05-16T15:45:12.591Z\n\ud83d\udccf Modified: 2025-05-16T16:50:21.240Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/ultraaddons-elementor-lite/vulnerability/wordpress-ultraaddons-elementor-lite-2-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:34:56.000000Z"}, {"uuid": "d8acfdf4-ec16-4772-9538-d965a86e5f20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48138", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpcpzdqjvi2w", "content": "", "creation_timestamp": "2025-05-16T19:07:36.487374Z"}, {"uuid": "05964a38-38b6-495f-b9ea-28e623e3dd34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48133", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqvmdajbur2e", "content": "", "creation_timestamp": "2025-06-06T00:47:18.172859Z"}, {"uuid": "6203ac0c-6544-4d15-9af0-9d4f6413d7b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-48137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpcodnnak62h", "content": "", "creation_timestamp": "2025-05-16T18:37:36.026014Z"}]}