VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java.
References
Link | Resource |
---|---|
https://github.com/t-oster/VisiCut | Product |
https://royblume.github.io/CVE-2025-25940/ | Exploit Third Party Advisory |
https://royblume.github.io/CVE-2025-25940/ | Exploit Third Party Advisory |
Configurations
History
23 Jun 2025, 20:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Visicut visicut
Visicut |
|
CPE | cpe:2.3:a:visicut:visicut:2.1:*:*:*:*:*:*:* | |
References | () https://github.com/t-oster/VisiCut - Product | |
References | () https://royblume.github.io/CVE-2025-25940/ - Exploit, Third Party Advisory |
12 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://royblume.github.io/CVE-2025-25940/ - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-502 | |
Summary |
|
10 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-10 16:15
Updated : 2025-06-23 20:05
NVD link : CVE-2025-25940
Mitre link : CVE-2025-25940
CVE.ORG link : CVE-2025-25940
JSON object : View
Products Affected
visicut
- visicut
CWE
CWE-502
Deserialization of Untrusted Data