Metrics
Affected Vendors & Products
Tue, 26 Aug 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
R1bbit
R1bbit yimioa |
|
| CPEs | cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yimihome
Yimihome ywoa |
R1bbit
R1bbit yimioa |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 05 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yimihome
Yimihome ywoa |
|
| CPEs | cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yimihome
Yimihome ywoa |
Wed, 12 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as problematic, has been found in ywoa up to 2024.07.03. This issue affects the function extract of the file c-main/src/main/java/com/redmoon/weixin/aes/XMLParse.java of the component WXCallBack Interface. The manipulation leads to xml external entity reference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component. | |
| Title | ywoa WXCallBack Interface XMLParse.java extract xml external entity reference | |
| Weaknesses | CWE-610 CWE-611 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-12T20:59:38.132Z
Reserved: 2025-02-11T08:02:25.549Z
Link: CVE-2025-1225
Updated: 2025-02-12T20:59:03.267Z
Status : Analyzed
Published: 2025-02-12T20:15:40.203
Modified: 2025-08-26T18:39:03.970
Link: CVE-2025-1225
No data.