diff --git a/2025/2xxx/CVE-2025-2595.json b/2025/2xxx/CVE-2025-2595.json index 6cc837c5561..8118a12309a 100644 --- a/2025/2xxx/CVE-2025-2595.json +++ b/2025/2xxx/CVE-2025-2595.json @@ -1,17 +1,98 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2595", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "info@cert.vde.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An unauthenticated remote attacker can bypass the user management in CODESYS Visualization and read visualization template files or static elements by means of forced browsing." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-425: Direct Request ('Forced Browsing')", + "cweId": "CWE-425" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "CODESYS", + "product": { + "product_data": [ + { + "product_name": "CODESYS Visualization", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0.0.0.0", + "version_value": "4.8.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://certvde.com/en/advisories/VDE-2025-027", + "refsource": "MISC", + "name": "https://certvde.com/en/advisories/VDE-2025-027" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "VDE-2025-027", + "defect": [ + "CERT@VDE#641763" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "M. Ankith by Honeywell" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/3xxx/CVE-2025-3529.json b/2025/3xxx/CVE-2025-3529.json index 6a7bec90619..35481f30761 100644 --- a/2025/3xxx/CVE-2025-3529.json +++ b/2025/3xxx/CVE-2025-3529.json @@ -1,17 +1,100 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3529", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.2 via the 'file_url' parameter. This makes it possible for unauthenticated attackers to view potentially sensitive information and download a digital product without paying for it." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-201 Insertion of Sensitive Information Into Sent Data", + "cweId": "CWE-201" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "mra13", + "product": { + "product_data": [ + { + "product_name": "WordPress Simple Shopping Cart", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "5.1.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8fecc015-518f-4aab-a17e-17cf4b8cf123?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8fecc015-518f-4aab-a17e-17cf4b8cf123?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/includes/wpsc-shortcodes-related.php#L92", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/includes/wpsc-shortcodes-related.php#L92" + }, + { + "url": "https://www.tipsandtricks-hq.com/ecommerce/wp-simple-cart-sell-digital-downloads-2468", + "refsource": "MISC", + "name": "https://www.tipsandtricks-hq.com/ecommerce/wp-simple-cart-sell-digital-downloads-2468" + }, + { + "url": "https://wordpress.org/plugins/wordpress-simple-paypal-shopping-cart/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wordpress-simple-paypal-shopping-cart/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3275373/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3275373/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Jack Taylor" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH" } ] } diff --git a/2025/3xxx/CVE-2025-3530.json b/2025/3xxx/CVE-2025-3530.json index 6662fa1e7aa..7c250502a61 100644 --- a/2025/3xxx/CVE-2025-3530.json +++ b/2025/3xxx/CVE-2025-3530.json @@ -1,17 +1,110 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-3530", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-472 External Control of Assumed-Immutable Web Parameter", + "cweId": "CWE-472" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "mra13", + "product": { + "product_data": [ + { + "product_name": "WordPress Simple Shopping Cart", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "5.1.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e0a3910b-adc4-4633-a6a1-32ba50894be4?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e0a3910b-adc4-4633-a6a1-32ba50894be4?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/wp_shopping_cart.php#L171", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/wp_shopping_cart.php#L171" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/wp_shopping_cart.php#L156", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/wp_shopping_cart.php#L156" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/wp_shopping_cart.php#L165", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/wp_shopping_cart.php#L165" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/wp_shopping_cart.php#L261", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/wp_shopping_cart.php#L261" + }, + { + "url": "https://www.tipsandtricks-hq.com/wordpress-simple-paypal-shopping-cart-plugin-768", + "refsource": "MISC", + "name": "https://www.tipsandtricks-hq.com/wordpress-simple-paypal-shopping-cart-plugin-768" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3275373/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3275373/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Jack Taylor" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH" } ] }