AI description
I was unable to find a description of CVE-2025-67842 in the provided search results. However, I did find information on other CVEs from 2025. It is possible that information on CVE-2025-67842 has not yet been published or is not yet widely available. Based on the search results, here are descriptions of other CVEs from 2025: * **CVE-2025-55182:** This vulnerability allows unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints. Even if an app does not implement any React Server Function endpoints, it may still be vulnerable if it supports React Server Components. The vulnerability exists due to unsafe deserialization of React Flight reply payloads on the server. * **CVE-2025-55183 and CVE-2025-67779:** These vulnerabilities in React Server Components can lead to a denial of service. A malicious HTTP request sent to any Server Functions endpoint can cause an infinite loop, hanging the server process and consuming CPU. * **CVE-2025-65842:** This vulnerability affects the Aquarius HelperTool (1.0.003) privileged XPC service on macOS and allows local privilege escalation. The service accepts XPC connections from any local process without validating the client's identity, and its authorization logic incorrectly calls AuthorizationCopyRights with a NULL reference, causing all authorization checks to succeed. * **CVE-2025-7842:** This vulnerability is a Cross-Site Request Forgery (CSRF) vulnerability in the Silencesoft RSS Reader plugin for WordPress. It allows unauthenticated attackers to delete RSS feeds from the affected WordPress installation.
- Description
- The Static Asset API in Mintlify Platform before 2025-11-15 allows remote attackers to inject arbitrary web script or HTML via the subdomain parameter because any tenant's assets can be served on any other tenant's documentation site.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- CNA Tags
- exclusively-hosted-service
- Products
- mintlify
CVSS 3.1
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- cve@mitre.org
- CWE-829
- Hype score
- Not currently trending
Redacted by Counsel: A supply chain postmortem on CVE-2025-67842, CVE-2025-67843, CVE-2025-67844, CVE-2025-67845 and CVE-2025-67846 https://t.co/As3XCuqQVI
@MDLcsgo
18 Dec 2025
3979 Impressions
2 Retweets
12 Likes
8 Bookmarks
0 Replies
0 Quotes
CVE-2025-67842 CVE-2025-67843 CVE-2025-67844 CVE-2025-67845 CVE-2025-67846 w/ @hackermondev, @MDLcsgo
@xyz3va
13 Dec 2025
15713 Impressions
14 Retweets
273 Likes
70 Bookmarks
14 Replies
3 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mintlify:mintlify:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4E599124-4B00-4D5C-ADB5-EC4564D3E5BF",
"versionEndExcluding": "2025-11-15"
}
],
"operator": "OR"
}
]
}
]