WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.
History

Wed, 08 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Description WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.
Title WeGIA Allows Arbitrary File Upload with Remote Code Execution (RCE)
Weaknesses CWE-434
CWE-94
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-01-07T22:07:13.958Z

Updated: 2025-01-08T14:52:28.078Z

Reserved: 2024-12-30T03:00:33.652Z

Link: CVE-2025-22133

cve-icon Vulnrichment

Updated: 2025-01-08T14:52:14.902Z

cve-icon NVD

Status : Received

Published: 2025-01-07T22:15:31.740

Modified: 2025-01-08T15:15:21.727

Link: CVE-2025-22133

cve-icon Redhat

No data.