{"vulnerability": "ghsa-q9f5-625g-xm39", "sightings": [{"uuid": "5eb5948f-a5a3-4b2e-90f6-994c6372f31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/19367fed712521a1833c7c1711d66e07", "content": "", "creation_timestamp": "2026-01-24T21:30:35.000000Z"}, {"uuid": "5b1380bb-0785-44ba-a4e5-10c047781be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/c2368f00bd72d41149f54bfc49fec47c", "content": "", "creation_timestamp": "2026-01-24T21:30:36.000000Z"}, {"uuid": "1ac8f174-2e8f-49dc-b49b-c3899f753f09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/d47e577d192090116b68a7b27e69bca4", "content": "", "creation_timestamp": "2026-01-24T22:42:37.000000Z"}, {"uuid": "3d9c1544-3560-4e6f-8d29-a2261a6e5a0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-Q9F5-625G-XM39", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8257", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29914\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.\n\ud83d\udccf Published: 2025-03-20T17:44:59.024Z\n\ud83d\udccf Modified: 2025-03-20T17:44:59.024Z\n\ud83d\udd17 References:\n1. https://github.com/corazawaf/coraza/security/advisories/GHSA-q9f5-625g-xm39\n2. https://github.com/corazawaf/coraza/commit/4722c9ad0d502abd56b8d6733c6b47eb4111742d", "creation_timestamp": "2025-03-20T18:20:54.000000Z"}, {"uuid": "03f0b300-47af-45f1-97b2-6bce61e1b8f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114196115958327030", "content": "", "creation_timestamp": "2025-03-20T18:14:06.134221Z"}]}