CVE-2025-25940

VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java.
References
Link Resource
https://github.com/t-oster/VisiCut Product
https://royblume.github.io/CVE-2025-25940/ Exploit Third Party Advisory
https://royblume.github.io/CVE-2025-25940/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:visicut:visicut:2.1:*:*:*:*:*:*:*

History

23 Jun 2025, 20:05

Type Values Removed Values Added
First Time Visicut visicut
Visicut
CPE cpe:2.3:a:visicut:visicut:2.1:*:*:*:*:*:*:*
References () https://github.com/t-oster/VisiCut - () https://github.com/t-oster/VisiCut - Product
References () https://royblume.github.io/CVE-2025-25940/ - () https://royblume.github.io/CVE-2025-25940/ - Exploit, Third Party Advisory

12 Mar 2025, 19:15

Type Values Removed Values Added
References () https://royblume.github.io/CVE-2025-25940/ - () https://royblume.github.io/CVE-2025-25940/ -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-502
Summary
  • (es) VisiCut 2.1 permite la ejecución de código a través de la deserialización de XML insegura en el método loadPlfFile de VisicutModel.java.

10 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-10 16:15

Updated : 2025-06-23 20:05


NVD link : CVE-2025-25940

Mitre link : CVE-2025-25940

CVE.ORG link : CVE-2025-25940


JSON object : View

Products Affected

visicut

  • visicut
CWE
CWE-502

Deserialization of Untrusted Data