{
"Source": "CVE FEED",
"Title": "CVE-2025-27216 - "UISP Privilege Escalation Vulnerability"",
"Content": "CVE ID : CVE-2025-27216
Published : Aug. 21, 2025, 1:15 a.m. | 37 minutes ago
Description : Multiple Incorrect Permission Assignment for Critical Resource in UISP Application may allow a malicious actor with certain permissions to escalate privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-27216 - "UISP Privilege Escalation Vulnerability"",
"Content": "CVE ID : CVE-2025-27216
Published : Aug. 21, 2025, 1:15 a.m. | 37 minutes ago
Description : Multiple Incorrect Permission Assignment for Critical Resource in UISP Application may allow a malicious actor with certain permissions to escalate privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9264 - Xuxueli XXL-Job ID Resource Manipulation Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-9264
Published : Aug. 21, 2025, 12:15 a.m. | 1 hour, 37 minutes ago
Description : A vulnerability was found in Xuxueli xxl-job up to 3.1.1. Affected by this issue is the function remove of the file /src/main/java/com/xxl/job/admin/controller/JobInfoController.java of the component Jobs Handler. Performing manipulation of the argument ID results in improper control of resource identifiers. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9264 - Xuxueli XXL-Job ID Resource Manipulation Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-9264
Published : Aug. 21, 2025, 12:15 a.m. | 1 hour, 37 minutes ago
Description : A vulnerability was found in Xuxueli xxl-job up to 3.1.1. Affected by this issue is the function remove of the file /src/main/java/com/xxl/job/admin/controller/JobInfoController.java of the component Jobs Handler. Performing manipulation of the argument ID results in improper control of resource identifiers. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-53505 - Group-Office Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-53505
Published : Aug. 21, 2025, 5:15 a.m. | 49 minutes ago
Description : Group-Office versions prior to 6.8.119 and prior to 25.0.20 provided by Intermesh BV contain a path traversal vulnerability. If this vulnerability is exploited, information on the server hosting the product may be exposed.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-53505 - Group-Office Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-53505
Published : Aug. 21, 2025, 5:15 a.m. | 49 minutes ago
Description : Group-Office versions prior to 6.8.119 and prior to 25.0.20 provided by Intermesh BV contain a path traversal vulnerability. If this vulnerability is exploited, information on the server hosting the product may be exposed.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-53504 - Group-Office Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-53504
Published : Aug. 21, 2025, 5:15 a.m. | 49 minutes ago
Description : Group-Office versions prior to 6.8.119 and prior to 25.0.20 provided by Intermesh BV contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed in the user's web browser.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-53504 - Group-Office Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-53504
Published : Aug. 21, 2025, 5:15 a.m. | 49 minutes ago
Description : Group-Office versions prior to 6.8.119 and prior to 25.0.20 provided by Intermesh BV contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed in the user's web browser.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57831 - Apache HTTP Server Unknown Method Response",
"Content": "CVE ID : CVE-2025-57831
Published : Aug. 21, 2025, 4:16 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57831 - Apache HTTP Server Unknown Method Response",
"Content": "CVE ID : CVE-2025-57831
Published : Aug. 21, 2025, 4:16 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57832 - Apache HTTP Server Unvalidated User Input",
"Content": "CVE ID : CVE-2025-57832
Published : Aug. 21, 2025, 4:16 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57832 - Apache HTTP Server Unvalidated User Input",
"Content": "CVE ID : CVE-2025-57832
Published : Aug. 21, 2025, 4:16 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57829 - Apache HTTP Server Command Injection",
"Content": "CVE ID : CVE-2025-57829
Published : Aug. 21, 2025, 4:16 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57829 - Apache HTTP Server Command Injection",
"Content": "CVE ID : CVE-2025-57829
Published : Aug. 21, 2025, 4:16 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57830 - Apache HTTP Server Authentication Bypass",
"Content": "CVE ID : CVE-2025-57830
Published : Aug. 21, 2025, 4:16 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57830 - Apache HTTP Server Authentication Bypass",
"Content": "CVE ID : CVE-2025-57830
Published : Aug. 21, 2025, 4:16 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57828 - Apache HTTP Server Unsecured Configuration",
"Content": "CVE ID : CVE-2025-57828
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57828 - Apache HTTP Server Unsecured Configuration",
"Content": "CVE ID : CVE-2025-57828
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57825 - Cisco WebEx Meeting Center Cross-Site Request Forgery",
"Content": "CVE ID : CVE-2025-57825
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57825 - Cisco WebEx Meeting Center Cross-Site Request Forgery",
"Content": "CVE ID : CVE-2025-57825
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57826 - Apache HTTP Server Cross-Site Request Forgery",
"Content": "CVE ID : CVE-2025-57826
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57826 - Apache HTTP Server Cross-Site Request Forgery",
"Content": "CVE ID : CVE-2025-57826
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57827 - Apache HTTP Server Authentication Bypass",
"Content": "CVE ID : CVE-2025-57827
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57827 - Apache HTTP Server Authentication Bypass",
"Content": "CVE ID : CVE-2025-57827
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-57824 - "Apache Struts Deserialization Vulnerability"",
"Content": "CVE ID : CVE-2025-57824
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-57824 - "Apache Struts Deserialization Vulnerability"",
"Content": "CVE ID : CVE-2025-57824
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48355 - ProveSource Social Proof Information Exposure Vulnerability",
"Content": "CVE ID : CVE-2025-48355
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ProveSource LTD ProveSource Social Proof allows Retrieve Embedded Sensitive Data.This issue affects ProveSource Social Proof: from n/a through 3.0.5.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-48355 - ProveSource Social Proof Information Exposure Vulnerability",
"Content": "CVE ID : CVE-2025-48355
Published : Aug. 21, 2025, 4:15 a.m. | 1 hour, 49 minutes ago
Description : Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ProveSource LTD ProveSource Social Proof allows Retrieve Embedded Sensitive Data.This issue affects ProveSource Social Proof: from n/a through 3.0.5.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36530 - Mattermost Plugin Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-36530
Published : Aug. 21, 2025, 7:15 a.m. | 49 minutes ago
Description : Mattermost versions 10.9.x <=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36530 - Mattermost Plugin Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-36530
Published : Aug. 21, 2025, 7:15 a.m. | 49 minutes ago
Description : Mattermost versions 10.9.x <=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-8607 - FunnelKit SlingBlocks Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-8607
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The SlingBlocks – Gutenberg Blocks by FunnelKit (Formerly WooFunnels) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown block's attributes in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-8607 - FunnelKit SlingBlocks Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-8607
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The SlingBlocks – Gutenberg Blocks by FunnelKit (Formerly WooFunnels) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown block's attributes in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-7390 - "OPC.HTTPS Client Certificate Trust Bypass"",
"Content": "CVE ID : CVE-2025-7390
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-7390 - "OPC.HTTPS Client Certificate Trust Bypass"",
"Content": "CVE ID : CVE-2025-7390
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-8592 - WordPress Inspiro CSRF Plugin Installation",
"Content": "CVE ID : CVE-2025-8592
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The Inspiro theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.2. This is due to missing or incorrect nonce validation on the inspiro_install_plugin() function. This makes it possible for unauthenticated attackers to install plugins from the repository via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-8592 - WordPress Inspiro CSRF Plugin Installation",
"Content": "CVE ID : CVE-2025-8592
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The Inspiro theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.2. This is due to missing or incorrect nonce validation on the inspiro_install_plugin() function. This makes it possible for unauthenticated attackers to install plugins from the repository via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-7221 - GiveWP – Donation Plugin and Fundraising Platform Unauthenticated Payment Status Modification Vulnerability",
"Content": "CVE ID : CVE-2025-7221
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the give_update_payment_status() function in all versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with GiveWP Worker-level access and above, to update donations statuses. This ability is not present in the user interface.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-7221 - GiveWP – Donation Plugin and Fundraising Platform Unauthenticated Payment Status Modification Vulnerability",
"Content": "CVE ID : CVE-2025-7221
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the give_update_payment_status() function in all versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with GiveWP Worker-level access and above, to update donations statuses. This ability is not present in the user interface.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-47870 - Mattermost Team Invite ID Disclosure",
"Content": "CVE ID : CVE-2025-47870
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-47870 - Mattermost Team Invite ID Disclosure",
"Content": "CVE ID : CVE-2025-47870
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-49222 - Mattermost File Type Validation Bypass",
"Content": "CVE ID : CVE-2025-49222
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-49222 - Mattermost File Type Validation Bypass",
"Content": "CVE ID : CVE-2025-49222
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹