Skip to content

Commit 423f554

Browse files
Advisory Database Sync
1 parent 6bfa3ea commit 423f554

File tree

116 files changed

+3869
-1
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

116 files changed

+3869
-1
lines changed

advisories/unreviewed/2025/06/GHSA-98qw-prqm-9f4p/GHSA-98qw-prqm-9f4p.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-98qw-prqm-9f4p",
4-
"modified": "2025-10-23T21:31:35Z",
4+
"modified": "2025-10-27T03:30:36Z",
55
"published": "2025-06-26T21:31:08Z",
66
"aliases": [
77
"CVE-2025-5318"
@@ -35,6 +35,10 @@
3535
"type": "WEB",
3636
"url": "https://access.redhat.com/errata/RHSA-2025:19012"
3737
},
38+
{
39+
"type": "WEB",
40+
"url": "https://access.redhat.com/errata/RHSA-2025:19098"
41+
},
3842
{
3943
"type": "WEB",
4044
"url": "https://access.redhat.com/security/cve/CVE-2025-5318"
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-23qm-g3r4-35xx",
4+
"modified": "2025-10-27T03:30:39Z",
5+
"published": "2025-10-27T03:30:39Z",
6+
"aliases": [
7+
"CVE-2025-62964"
8+
],
9+
"details": "Missing Authorization vulnerability in RealMag777 MDTF wp-meta-data-filter-and-taxonomy-filter allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MDTF: from n/a through <= 1.3.4.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62964"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/wp-meta-data-filter-and-taxonomy-filter/vulnerability/wordpress-mdtf-plugin-1-3-4-broken-access-control-vulnerability"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-862"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-27T02:15:56Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-253g-qmmx-2x98",
4+
"modified": "2025-10-27T03:30:38Z",
5+
"published": "2025-10-27T03:30:37Z",
6+
"aliases": [
7+
"CVE-2025-62902"
8+
],
9+
"details": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ThemeHunk WP Popup Builder wp-popup-builder allows Retrieve Embedded Sensitive Data.This issue affects WP Popup Builder: from n/a through <= 1.3.6.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62902"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/wp-popup-builder/vulnerability/wordpress-wp-popup-builder-plugin-1-3-6-sensitive-data-exposure-vulnerability"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-497"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-27T02:15:49Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2r2f-xx92-v4f7",
4+
"modified": "2025-10-27T03:30:38Z",
5+
"published": "2025-10-27T03:30:38Z",
6+
"aliases": [
7+
"CVE-2025-62935"
8+
],
9+
"details": "Missing Authorization vulnerability in ilmosys Open Close WooCommerce Store woc-open-close allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Open Close WooCommerce Store: from n/a through <= 4.9.8.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62935"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/woc-open-close/vulnerability/wordpress-open-close-woocommerce-store-plugin-4-9-8-broken-access-control-vulnerability"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-862"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-27T02:15:53Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2rjw-37q7-prrc",
4+
"modified": "2025-10-27T03:30:39Z",
5+
"published": "2025-10-27T03:30:39Z",
6+
"aliases": [
7+
"CVE-2025-62957"
8+
],
9+
"details": "Cross-Site Request Forgery (CSRF) vulnerability in NikanWP NikanWP WooCommerce Reporting wc-reports-lite allows Stored XSS.This issue affects NikanWP WooCommerce Reporting: from n/a through <= 1.0.0.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62957"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/wc-reports-lite/vulnerability/wordpress-nikanwp-woocommerce-reporting-plugin-1-0-0-cross-site-request-forgery-csrf-vulnerability"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-352"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-27T02:15:56Z"
30+
}
31+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2w76-84vx-75wq",
4+
"modified": "2025-10-27T03:30:39Z",
5+
"published": "2025-10-27T03:30:39Z",
6+
"aliases": [
7+
"CVE-2025-12204"
8+
],
9+
"details": "A security vulnerability has been detected in Kamailio 5.5. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12204"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://shimo.im/docs/loqeMWMyZGtpEYqn"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.329874"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.329874"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.673224"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-119"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-10-27T03:15:49Z"
51+
}
52+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2x26-r374-v69m",
4+
"modified": "2025-10-27T03:30:38Z",
5+
"published": "2025-10-27T03:30:37Z",
6+
"aliases": [
7+
"CVE-2025-62905"
8+
],
9+
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Tadlock Query Posts query-posts allows Stored XSS.This issue affects Query Posts: from n/a through <= 0.3.2.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62905"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/query-posts/vulnerability/wordpress-query-posts-plugin-0-3-2-cross-site-scripting-xss-vulnerability"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-79"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-27T02:15:49Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2x76-q69m-x8p7",
4+
"modified": "2025-10-27T03:30:39Z",
5+
"published": "2025-10-27T03:30:39Z",
6+
"aliases": [
7+
"CVE-2025-62953"
8+
],
9+
"details": "Missing Authorization vulnerability in nanbu Welcart e-Commerce usc-e-shop allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Welcart e-Commerce: from n/a through <= 2.11.24.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62953"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/usc-e-shop/vulnerability/wordpress-welcart-e-commerce-plugin-2-11-24-broken-access-control-vulnerability"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-862"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-27T02:15:55Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3wcv-7wxv-gvf8",
4+
"modified": "2025-10-27T03:30:39Z",
5+
"published": "2025-10-27T03:30:39Z",
6+
"aliases": [
7+
"CVE-2025-62987"
8+
],
9+
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Builderall Builderall Builder for WordPress builderall-cheetah-for-wp allows Stored XSS.This issue affects Builderall Builder for WordPress: from n/a through <= 3.0.1.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62987"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/builderall-cheetah-for-wp/vulnerability/wordpress-builderall-builder-for-wordpress-plugin-3-0-1-cross-site-scripting-xss-vulnerability"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-79"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-27T02:15:59Z"
30+
}
31+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-43fg-2qr4-qfpx",
4+
"modified": "2025-10-27T03:30:38Z",
5+
"published": "2025-10-27T03:30:38Z",
6+
"aliases": [
7+
"CVE-2025-62910"
8+
],
9+
"details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in deshine Video Gallery by Huzzaz huzzaz-video-gallery allows Stored XSS.This issue affects Video Gallery by Huzzaz: from n/a through <= 10.5.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62910"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://vdp.patchstack.com/database/Wordpress/Plugin/huzzaz-video-gallery/vulnerability/wordpress-video-gallery-by-huzzaz-plugin-10-5-cross-site-scripting-xss-vulnerability"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-79"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2025-10-27T02:15:50Z"
30+
}
31+
}

0 commit comments

Comments
 (0)