Skip to content

Commit 1b91538

Browse files
Advisory Database Sync
1 parent 6edaa1f commit 1b91538

File tree

213 files changed

+6649
-1
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

213 files changed

+6649
-1
lines changed

advisories/unreviewed/2025/07/GHSA-3pvj-q7qj-89fg/GHSA-3pvj-q7qj-89fg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3pvj-q7qj-89fg",
4-
"modified": "2025-12-17T21:30:31Z",
4+
"modified": "2025-12-18T09:30:24Z",
55
"published": "2025-07-07T15:30:39Z",
66
"aliases": [
77
"CVE-2025-5987"
@@ -19,6 +19,10 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5987"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://access.redhat.com/errata/RHSA-2025:23483"
25+
},
2226
{
2327
"type": "WEB",
2428
"url": "https://access.redhat.com/errata/RHSA-2025:23484"
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2265-g92x-3448",
4+
"modified": "2025-12-18T09:30:27Z",
5+
"published": "2025-12-18T09:30:27Z",
6+
"aliases": [
7+
"CVE-2025-58947"
8+
],
9+
"details": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Athos athos allows PHP Local File Inclusion.This issue affects Athos: from n/a through <= 1.9.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58947"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Theme/athos/vulnerability/wordpress-athos-theme-1-9-local-file-inclusion-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-98"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:16:02Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-233v-c87g-g57r",
4+
"modified": "2025-12-18T09:30:28Z",
5+
"published": "2025-12-18T09:30:28Z",
6+
"aliases": [
7+
"CVE-2025-60055"
8+
],
9+
"details": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Fabrica fabrica allows PHP Local File Inclusion.This issue affects Fabrica: from n/a through <= 1.8.1.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-60055"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Theme/fabrica/vulnerability/wordpress-fabrica-theme-1-8-1-local-file-inclusion-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-98"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:16:05Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-26hr-x62r-xc25",
4+
"modified": "2025-12-18T09:30:26Z",
5+
"published": "2025-12-18T09:30:26Z",
6+
"aliases": [
7+
"CVE-2025-54745"
8+
],
9+
"details": "Missing Authorization vulnerability in miniOrange miniOrange's Google Authenticator miniorange-2-factor-authentication allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects miniOrange's Google Authenticator: from n/a through <= 6.1.1.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54745"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/miniorange-2-factor-authentication/vulnerability/wordpress-miniorange-s-google-authenticator-plugin-6-1-1-broken-access-control-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-862"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:15:56Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2cq9-p3hh-4x7f",
4+
"modified": "2025-12-18T09:30:26Z",
5+
"published": "2025-12-18T09:30:26Z",
6+
"aliases": [
7+
"CVE-2025-58710"
8+
],
9+
"details": "Incorrect Privilege Assignment vulnerability in e-plugins Hotel Listing hotel-listing allows Privilege Escalation.This issue affects Hotel Listing: from n/a through <= 1.4.0.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58710"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/hotel-listing/vulnerability/wordpress-hotel-listing-plugin-1-4-0-privilege-escalation-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-266"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:15:57Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2ffc-fhcm-rq53",
4+
"modified": "2025-12-18T09:30:26Z",
5+
"published": "2025-12-18T09:30:26Z",
6+
"aliases": [
7+
"CVE-2025-54748"
8+
],
9+
"details": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in RomanCode MapSVG mapsvg allows Path Traversal.This issue affects MapSVG: from n/a through < 8.6.12.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54748"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/mapsvg/vulnerability/wordpress-mapsvg-plugin-8-6-12-arbitrary-file-download-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-22"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:15:56Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2fv4-c5wh-p3p5",
4+
"modified": "2025-12-18T09:30:25Z",
5+
"published": "2025-12-18T09:30:25Z",
6+
"aliases": [
7+
"CVE-2025-49365"
8+
],
9+
"details": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Jack Well jack-well allows PHP Local File Inclusion.This issue affects Jack Well: from n/a through <= 1.0.14.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49365"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Theme/jack-well/vulnerability/wordpress-jack-well-theme-1-0-14-local-file-inclusion-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-98"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:15:50Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2g4w-jfv5-fgmr",
4+
"modified": "2025-12-18T09:30:29Z",
5+
"published": "2025-12-18T09:30:28Z",
6+
"aliases": [
7+
"CVE-2025-60089"
8+
],
9+
"details": "Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms FreshDesk Plugin gf-freshdesk allows Object Injection.This issue affects WP Gravity Forms FreshDesk Plugin: from n/a through <= 1.3.5.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-60089"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/gf-freshdesk/vulnerability/wordpress-wp-gravity-forms-freshdesk-plugin-plugin-1-3-5-deserialization-of-untrusted-data-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-502"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:16:09Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2jm4-pp6h-mpwx",
4+
"modified": "2025-12-18T09:30:27Z",
5+
"published": "2025-12-18T09:30:27Z",
6+
"aliases": [
7+
"CVE-2025-58945"
8+
],
9+
"details": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes EcoGrow ecogrow allows PHP Local File Inclusion.This issue affects EcoGrow: from n/a through <= 1.7.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58945"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Theme/ecogrow/vulnerability/wordpress-ecogrow-theme-1-7-local-file-inclusion-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-98"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:16:02Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2jmv-v5xf-w928",
4+
"modified": "2025-12-18T09:30:25Z",
5+
"published": "2025-12-18T09:30:25Z",
6+
"aliases": [
7+
"CVE-2025-53446"
8+
],
9+
"details": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Beautique beautique allows PHP Local File Inclusion.This issue affects Beautique: from n/a through <= 1.5.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53446"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Theme/beautique/vulnerability/wordpress-beautique-theme-1-5-local-file-inclusion-vulnerability?_s_id=cve"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-98"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-12-18T08:15:55Z"
30+
}
31+
}

0 commit comments

Comments
 (0)