Skip to content

Commit cc931a1

Browse files
1 parent 5bfe17d commit cc931a1

File tree

3 files changed

+50
-2
lines changed

3 files changed

+50
-2
lines changed

advisories/unreviewed/2025/08/GHSA-7pcv-gm7q-mj69/GHSA-7pcv-gm7q-mj69.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7pcv-gm7q-mj69",
4-
"modified": "2025-08-04T12:30:41Z",
4+
"modified": "2025-10-29T00:30:25Z",
55
"published": "2025-08-04T12:30:41Z",
66
"aliases": [
77
"CVE-2025-6205"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6205"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-6205"
2529
}
2630
],
2731
"database_specific": {

advisories/unreviewed/2025/08/GHSA-xxh4-727v-gjcv/GHSA-xxh4-727v-gjcv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xxh4-727v-gjcv",
4-
"modified": "2025-08-04T12:30:41Z",
4+
"modified": "2025-10-29T00:30:25Z",
55
"published": "2025-08-04T12:30:41Z",
66
"aliases": [
77
"CVE-2025-6204"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6204"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-6204"
2529
}
2630
],
2731
"database_specific": {
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mj35-jrmp-p9jm",
4+
"modified": "2025-10-29T00:30:26Z",
5+
"published": "2025-10-29T00:30:26Z",
6+
"aliases": [
7+
"CVE-2025-4665"
8+
],
9+
"details": "WordPress plugin Contact Form CFDB7 versions up to and including 1.3.2 are affected by a pre-authentication SQL injection vulnerability that cascades into insecure deserialization (PHP Object Injection). The weakness arises due to insufficient validation of user input in plugin endpoints, allowing crafted input to influence backend queries in unexpected ways. Using specially crafted payloads, this can escalate into unsafe deserialization, enabling arbitrary object injection in PHP. Although the issue is remotely exploitable without authentication, it does require a crafted interaction with the affected endpoint in order to trigger successfully.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4665"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0006.md"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://wordpress.org/plugins/contact-form-cfdb7"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-89"
34+
],
35+
"severity": "CRITICAL",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2025-10-29T00:15:34Z"
39+
}
40+
}

0 commit comments

Comments
 (0)