Skip to content

Commit 8e0297c

Browse files

File tree

6 files changed

+224
-15
lines changed

6 files changed

+224
-15
lines changed

advisories/unreviewed/2025/10/GHSA-gj84-8vfx-q3vm/GHSA-gj84-8vfx-q3vm.json

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gj84-8vfx-q3vm",
4-
"modified": "2025-11-11T21:30:27Z",
4+
"modified": "2025-11-12T06:30:24Z",
55
"published": "2025-10-09T15:31:03Z",
66
"aliases": [
77
"CVE-2025-11561"
@@ -21,63 +21,67 @@
2121
},
2222
{
2323
"type": "WEB",
24-
"url": "https://access.redhat.com/errata/RHSA-2025:19610"
24+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402727"
2525
},
2626
{
2727
"type": "WEB",
28-
"url": "https://access.redhat.com/errata/RHSA-2025:19847"
28+
"url": "https://blog.async.sg/kerberos-ldr"
2929
},
3030
{
3131
"type": "WEB",
32-
"url": "https://access.redhat.com/errata/RHSA-2025:19848"
32+
"url": "https://access.redhat.com/security/cve/CVE-2025-11561"
3333
},
3434
{
3535
"type": "WEB",
36-
"url": "https://access.redhat.com/errata/RHSA-2025:19849"
36+
"url": "https://access.redhat.com/errata/RHSA-2025:21067"
3737
},
3838
{
3939
"type": "WEB",
40-
"url": "https://access.redhat.com/errata/RHSA-2025:19850"
40+
"url": "https://access.redhat.com/errata/RHSA-2025:21020"
4141
},
4242
{
4343
"type": "WEB",
44-
"url": "https://access.redhat.com/errata/RHSA-2025:19851"
44+
"url": "https://access.redhat.com/errata/RHSA-2025:20954"
4545
},
4646
{
4747
"type": "WEB",
48-
"url": "https://access.redhat.com/errata/RHSA-2025:19852"
48+
"url": "https://access.redhat.com/errata/RHSA-2025:19859"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://access.redhat.com/errata/RHSA-2025:19854"
4953
},
5054
{
5155
"type": "WEB",
5256
"url": "https://access.redhat.com/errata/RHSA-2025:19853"
5357
},
5458
{
5559
"type": "WEB",
56-
"url": "https://access.redhat.com/errata/RHSA-2025:19854"
60+
"url": "https://access.redhat.com/errata/RHSA-2025:19852"
5761
},
5862
{
5963
"type": "WEB",
60-
"url": "https://access.redhat.com/errata/RHSA-2025:19859"
64+
"url": "https://access.redhat.com/errata/RHSA-2025:19851"
6165
},
6266
{
6367
"type": "WEB",
64-
"url": "https://access.redhat.com/errata/RHSA-2025:20954"
68+
"url": "https://access.redhat.com/errata/RHSA-2025:19850"
6569
},
6670
{
6771
"type": "WEB",
68-
"url": "https://access.redhat.com/errata/RHSA-2025:21020"
72+
"url": "https://access.redhat.com/errata/RHSA-2025:19849"
6973
},
7074
{
7175
"type": "WEB",
72-
"url": "https://access.redhat.com/security/cve/CVE-2025-11561"
76+
"url": "https://access.redhat.com/errata/RHSA-2025:19848"
7377
},
7478
{
7579
"type": "WEB",
76-
"url": "https://blog.async.sg/kerberos-ldr"
80+
"url": "https://access.redhat.com/errata/RHSA-2025:19847"
7781
},
7882
{
7983
"type": "WEB",
80-
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402727"
84+
"url": "https://access.redhat.com/errata/RHSA-2025:19610"
8185
}
8286
],
8387
"database_specific": {
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gx7v-vcr7-wxqp",
4+
"modified": "2025-11-12T06:30:24Z",
5+
"published": "2025-11-12T06:30:24Z",
6+
"aliases": [
7+
"CVE-2025-12087"
8+
],
9+
"details": "The Wishlist and Save for later for Woocommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.1.22 via the 'awwlm_remove_added_wishlist_page' AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete wishlist items from other user's wishlists.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12087"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://plugins.trac.wordpress.org/log/aco-wishlist-for-woocommerce"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17e8a743-7985-4b28-b854-ac052a834f3a?source=cve"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-639"
34+
],
35+
"severity": "MODERATE",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-11-12T05:15:39Z"
39+
}
40+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-jww7-hq4m-9wq6",
4+
"modified": "2025-11-12T06:30:24Z",
5+
"published": "2025-11-12T06:30:24Z",
6+
"aliases": [
7+
"CVE-2025-12901"
8+
],
9+
"details": "The Asgaros Forum plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.1. This is due to missing nonce validation on the set_subscription_level() function. This makes it possible for unauthenticated attackers to modify the subscription settings of authenticated users via a forged request granted they can trick a logged-in user into performing an action such as clicking on a link.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12901"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/Asgaros/asgaros-forum/commit/92305fb8ba4ec0a6c65256915d0a32e5553b74f3"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://plugins.trac.wordpress.org/browser/asgaros-forum/tags/3.2.1/includes/forum-notifications.php#L605"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://plugins.trac.wordpress.org/browser/asgaros-forum/tags/3.2.1/includes/forum-notifications.php#L606"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3392004%40asgaros-forum&new=3392004%40asgaros-forum&sfp_email=&sfph_mail="
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/75625e6e-f75b-4e11-acd8-7388efb12b29?source=cve"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-352"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-11-12T05:15:43Z"
51+
}
52+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-pmjc-x5xh-p27v",
4+
"modified": "2025-11-12T06:30:24Z",
5+
"published": "2025-11-12T06:30:24Z",
6+
"aliases": [
7+
"CVE-2025-12833"
8+
],
9+
"details": "The GeoDirectory – WP Business Directory Plugin and Classified Listings Directory plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.8.139 via the 'post_attachment_upload' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with author-level access and above, to attach arbitrary image files to arbitrary places.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12833"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/AyeCode/geodirectory/commit/db655b04be32a160c0abf73217faf0a50585aa92"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3393024%40geodirectory&new=3393024%40geodirectory&sfp_email=&sfph_mail="
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://wordpress.org/plugins/geodirectory"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/408f0c2a-ef3c-4592-8722-d56afce92e24?source=cve"
37+
}
38+
],
39+
"database_specific": {
40+
"cwe_ids": [
41+
"CWE-639"
42+
],
43+
"severity": "MODERATE",
44+
"github_reviewed": false,
45+
"github_reviewed_at": null,
46+
"nvd_published_at": "2025-11-12T05:15:41Z"
47+
}
48+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-x3hh-fgq4-6rqr",
4+
"modified": "2025-11-12T06:30:24Z",
5+
"published": "2025-11-12T06:30:24Z",
6+
"aliases": [
7+
"CVE-2025-54983"
8+
],
9+
"details": "A health check port on Zscaler Client Connector on Windows, versions 4.6 < 4.6.0.216 and 4.7 < 4.7.0.47, which under specific circumstances was not released after use, allowed traffic to potentially bypass ZCC forwarding controls.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54983"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2025"
25+
}
26+
],
27+
"database_specific": {
28+
"cwe_ids": [
29+
"CWE-772"
30+
],
31+
"severity": "MODERATE",
32+
"github_reviewed": false,
33+
"github_reviewed_at": null,
34+
"nvd_published_at": "2025-11-12T04:15:41Z"
35+
}
36+
}
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-xh54-v5gh-jq8v",
4+
"modified": "2025-11-12T06:30:24Z",
5+
"published": "2025-11-12T06:30:24Z",
6+
"aliases": [
7+
"CVE-2025-11560"
8+
],
9+
"details": "The Team Members Showcase WordPress plugin before 3.5.0 does not sanitize and escape a parameter before outputting it back in the page, leading to reflected cross-site scripting, which could be used against high-privilege users such as admins.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11560"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://wpscan.com/vulnerability/64d7a074-3f1d-4b09-8e96-d76b9fb3c41e"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [],
24+
"severity": null,
25+
"github_reviewed": false,
26+
"github_reviewed_at": null,
27+
"nvd_published_at": "2025-11-12T06:15:33Z"
28+
}
29+
}

0 commit comments

Comments
 (0)