{
	"id": "842c779e-ac3b-4a60-b4c4-9a2f6deca8f7",
	"created_at": "2026-04-06T00:10:43.364772Z",
	"updated_at": "2026-04-10T03:20:51.486921Z",
	"deleted_at": null,
	"sha1_hash": "02d8ca4791f19109d1d91e4c542bcebe492300c9",
	"title": "GCVE-1-2025-0002 - Vulnerability-Lookup",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 41056,
	"plain_text": "GCVE-1-2025-0002 - Vulnerability-Lookup\nArchived: 2026-04-05 21:47:13 UTC\n{\n \"containers\": {\n \"cna\": {\n \"affected\": [\n {\n \"defaultStatus\": \"unaffected\",\n \"product\": \"exfiltration\",\n \"vendor\": \"Cl0p ransomware\",\n \"versions\": [\n {\n \"status\": \"affected\",\n },\n ],\n },\n ],\n \"credits\": [\n {\n \"lang\": \"en\",\n \"type\": \"finder\",\n \"value\": \"Lorenzo Nicolodi\",\n },\n ],\n \"descriptions\": [\n {\n \"lang\": \"en\",\n \"supportingMedia\": [\n {\n \"base64\": false,\n \"type\": \"text/html\",\n \"value\": \"\n\nThe Python-based data-exfiltration utility used by the Cl0p ranso\n },\n ],\n \"value\": \"The Python-based data-exfiltration utility used by the Cl0p ransomware group\n },\n ],\n \"impacts\": [\n {\n \"capecId\": \"CAPEC-549\",\n \"descriptions\": [\n {\nhttps://vulnerability.circl.lu/vuln/gcve-1-2025-0002\nPage 1 of 4\n\n\"lang\": \"en\",\r\n \"value\": \"CAPEC-549 Local Execution of Code\",\r\n },\r\n ],\r\n },\r\n ],\r\n \"metrics\": [\r\n {\r\n \"cvssV4_0\": {\r\n \"Automatable\": \"YES\",\r\n \"Recovery\": \"NOT_DEFINED\",\r\n \"Safety\": \"NOT_DEFINED\",\r\n \"attackComplexity\": \"LOW\",\r\n \"attackRequirements\": \"PRESENT\",\r\n \"attackVector\": \"NETWORK\",\r\n \"baseScore\": 8.9,\r\n \"baseSeverity\": \"HIGH\",\r\n \"privilegesRequired\": \"NONE\",\r\n \"providerUrgency\": \"NOT_DEFINED\",\r\n \"subAvailabilityImpact\": \"HIGH\",\r\n \"subConfidentialityImpact\": \"HIGH\",\r\n \"subIntegrityImpact\": \"HIGH\",\r\n \"userInteraction\": \"ACTIVE\",\r\n \"valueDensity\": \"NOT_DEFINED\",\r\n \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU\r\n \"version\": \"4.0\",\r\n \"vulnAvailabilityImpact\": \"HIGH\",\r\n \"vulnConfidentialityImpact\": \"HIGH\",\r\n \"vulnIntegrityImpact\": \"HIGH\",\r\n \"vulnerabilityResponseEffort\": \"NOT_DEFINED\",\r\n },\r\n \"format\": \"CVSS\",\r\n \"scenarios\": [\r\n {\r\n \"lang\": \"en\",\r\n \"value\": \"GENERAL\",\r\n },\r\n ],\r\n },\r\n ],\r\n \"problemTypes\": [\r\n {\r\n \"descriptions\": [\r\n {\r\n \"cweId\": \"CWE-20\",\r\n \"description\": \"CWE-20 Improper Input Validation\",\r\n \"lang\": \"en\",\r\nhttps://vulnerability.circl.lu/vuln/gcve-1-2025-0002\r\nPage 2 of 4\n\n\"type\": \"CWE\",\r\n },\r\n ],\r\n },\r\n ],\r\n \"providerMetadata\": {\r\n \"orgId\": \"00000000-0000-4000-9000-000000000000\",\r\n },\r\n \"references\": [\r\n {\r\n \"tags\": [\r\n \"related\",\r\n ],\r\n \"url\": \"https://amnwxasjtjc6e42siac6t45mhbkgtycrx5krv7sf5festvqxmnchuayd.onion\",\r\n },\r\n {\r\n \"tags\": [\r\n \"related\",\r\n ],\r\n \"url\": \"https://www.hackthebox.com/blog/cve-2023-34362-explained\",\r\n },\r\n ],\r\n \"source\": {\r\n \"discovery\": \"UNKNOWN\",\r\n },\r\n \"title\": \"Command Injection in Cl0p Exfiltration Python Script\",\r\n \"x_generator\": {\r\n \"engine\": \"Vulnogram 0.2.0\",\r\n },\r\n },\r\n },\r\n \"cveMetadata\": {\r\n \"assignerOrgId\": \"00000000-0000-4000-9000-000000000000\",\r\n \"datePublished\": \"2025-07-01T08:19:00.000Z\",\r\n \"dateUpdated\": \"2025-07-01T10:58:58.443468Z\",\r\n \"requesterUserId\": \"00000000-0000-4000-9000-000000000000\",\r\n \"serial\": 1,\r\n \"state\": \"PUBLISHED\",\r\n \"vulnId\": \"GCVE-1-2025-0002\",\r\n \"vulnerabilitylookup_history\": [\r\n [\r\n \"alexandre.dulaunoy@circl.lu\",\r\n \"2025-07-01T08:19:55.399348Z\",\r\n ],\r\n [\r\n \"alexandre.dulaunoy@circl.lu\",\r\n \"2025-07-01T08:23:59.977382Z\",\r\nhttps://vulnerability.circl.lu/vuln/gcve-1-2025-0002\r\nPage 3 of 4\n\n],\r\n [\r\n \"alexandre.dulaunoy@circl.lu\",\r\n \"2025-07-01T10:58:58.443468Z\",\r\n ],\r\n ],\r\n },\r\n \"dataType\": \"CVE_RECORD\",\r\n \"dataVersion\": \"5.1\",\r\n}\r\nSource: https://vulnerability.circl.lu/vuln/gcve-1-2025-0002\r\nhttps://vulnerability.circl.lu/vuln/gcve-1-2025-0002\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://vulnerability.circl.lu/vuln/gcve-1-2025-0002"
	],
	"report_names": [
		"gcve-1-2025-0002"
	],
	"threat_actors": [],
	"ts_created_at": 1775434243,
	"ts_updated_at": 1775791251,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/02d8ca4791f19109d1d91e4c542bcebe492300c9.pdf",
		"text": "https://archive.orkl.eu/02d8ca4791f19109d1d91e4c542bcebe492300c9.txt",
		"img": "https://archive.orkl.eu/02d8ca4791f19109d1d91e4c542bcebe492300c9.jpg"
	}
}