Skip to content

Commit fe5dab1

Browse files
committed
Update taxonomy
1 parent 0bd6033 commit fe5dab1

File tree

1 file changed

+88
-0
lines changed

1 file changed

+88
-0
lines changed

taxonomy/scenarios.json

Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3379,6 +3379,50 @@
33793379
"CWE-94"
33803380
]
33813381
},
3382+
"crowdsecurity/vpatch-CVE-2025-40552": {
3383+
"name": "crowdsecurity/vpatch-CVE-2025-40552",
3384+
"description": "Detects authentication bypass in SolarWinds Web Help Desk via WebObjects wopage parameter access to sensitive pages",
3385+
"label": "SolarWinds Web Help Desk - Authentication Bypass",
3386+
"behaviors": [
3387+
"http:exploit"
3388+
],
3389+
"mitre_attacks": [
3390+
"TA0001:T1190"
3391+
],
3392+
"confidence": 3,
3393+
"spoofable": 0,
3394+
"cti": true,
3395+
"service": "http",
3396+
"created_at": "2026-02-27T09:11:25",
3397+
"cves": [
3398+
"CVE-2025-40552"
3399+
],
3400+
"cwes": [
3401+
"CWE-287"
3402+
]
3403+
},
3404+
"crowdsecurity/vpatch-CVE-2025-4689": {
3405+
"name": "crowdsecurity/vpatch-CVE-2025-4689",
3406+
"description": "Detects WordPress Ads Pro Plugin unauthenticated SQLi + LFI chain via wp-ajax endpoint targeting a_id parameter (CVE-2025-4689)",
3407+
"label": "WordPress Ads Pro Plugin - SQLI",
3408+
"behaviors": [
3409+
"http:exploit"
3410+
],
3411+
"mitre_attacks": [
3412+
"TA0001:T1190"
3413+
],
3414+
"confidence": 3,
3415+
"spoofable": 0,
3416+
"cti": true,
3417+
"service": "http",
3418+
"created_at": "2026-02-26T09:31:51",
3419+
"cves": [
3420+
"CVE-2025-4689"
3421+
],
3422+
"cwes": [
3423+
"CWE-89"
3424+
]
3425+
},
33823426
"crowdsecurity/vpatch-CVE-2025-47188": {
33833427
"name": "crowdsecurity/vpatch-CVE-2025-47188",
33843428
"description": "Detects OS command injection in Mitel 6000 series SIP Phones via ringtone upload functionality.",
@@ -3643,6 +3687,28 @@
36433687
"CWE-89"
36443688
]
36453689
},
3690+
"crowdsecurity/vpatch-CVE-2025-61678": {
3691+
"name": "crowdsecurity/vpatch-CVE-2025-61678",
3692+
"description": "Detects FreePBX arbitrary file upload RCE via fwbrand directory traversal in Custom Firmware Management endpoint (CVE-2025-61678)",
3693+
"label": "FreePBX - RCE",
3694+
"behaviors": [
3695+
"http:exploit"
3696+
],
3697+
"mitre_attacks": [
3698+
"TA0001:T1190"
3699+
],
3700+
"confidence": 3,
3701+
"spoofable": 0,
3702+
"cti": true,
3703+
"service": "http",
3704+
"created_at": "2026-02-26T09:31:51",
3705+
"cves": [
3706+
"CVE-2025-61678"
3707+
],
3708+
"cwes": [
3709+
"CWE-22"
3710+
]
3711+
},
36463712
"crowdsecurity/vpatch-CVE-2025-61882": {
36473713
"name": "crowdsecurity/vpatch-CVE-2025-61882",
36483714
"description": "Detects Oracle E-Business Suite 12.2.3\u201312.2.14 LFI and SSRF/RCE via ieshostedsurvey.jsp and UiServlet endpoints.",
@@ -3687,6 +3753,28 @@
36873753
"CWE-23"
36883754
]
36893755
},
3756+
"crowdsecurity/vpatch-CVE-2025-66039": {
3757+
"name": "crowdsecurity/vpatch-CVE-2025-66039",
3758+
"description": "Detects FreePBX authentication bypass and SQL injection chain via admin config endpoint (CVE-2025-66039, CVE-2025-61675)",
3759+
"label": "FreePBX - Authentication Bypass SQLI",
3760+
"behaviors": [
3761+
"http:exploit"
3762+
],
3763+
"mitre_attacks": [
3764+
"TA0001:T1190"
3765+
],
3766+
"confidence": 3,
3767+
"spoofable": 0,
3768+
"cti": true,
3769+
"service": "http",
3770+
"created_at": "2026-02-26T09:31:51",
3771+
"cves": [
3772+
"CVE-2025-66039"
3773+
],
3774+
"cwes": [
3775+
"CWE-89"
3776+
]
3777+
},
36903778
"crowdsecurity/vpatch-CVE-2025-8110": {
36913779
"name": "crowdsecurity/vpatch-CVE-2025-8110",
36923780
"description": "Detects symlink bypass vulnerability in Gogs PutContents API allowing file overwrite and potential RCE (CVE-2025-8110)",

0 commit comments

Comments
 (0)