WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8. | |
Title | WeGIA Allows Arbitrary File Upload with Remote Code Execution (RCE) | |
Weaknesses | CWE-434 CWE-94 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-07T22:07:13.958Z
Updated: 2025-01-08T14:52:28.078Z
Reserved: 2024-12-30T03:00:33.652Z
Link: CVE-2025-22133
Vulnrichment
Updated: 2025-01-08T14:52:14.902Z
NVD
Status : Received
Published: 2025-01-07T22:15:31.740
Modified: 2025-01-08T15:15:21.727
Link: CVE-2025-22133
Redhat
No data.