WeGIA is a Web manager for charitable institutions. The fix for CVE-2025-22133 was not enough to remediate the arbitrary file upload vulnerability. The WeGIA only check MIME types for Excel files at endpoint `/html/socio/sistema/controller/controla_xlsx.php`, which can be bypassed by using magic bytes of Excel file in a PHP file. As a result, attacker can upload webshell to the server for remote code execution. Version 3.4.11 contains an updated fix.
Metrics
Affected Vendors & Products
References
History
Mon, 08 Sep 2025 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is a Web manager for charitable institutions. The fix for CVE-2025-22133 was not enough to remediate the arbitrary file upload vulnerability. The WeGIA only check MIME types for Excel files at endpoint `/html/socio/sistema/controller/controla_xlsx.php`, which can be bypassed by using magic bytes of Excel file in a PHP file. As a result, attacker can upload webshell to the server for remote code execution. Version 3.4.11 contains an updated fix. | |
Title | WeGIA has a bypass for the fix for CVE-2025-22133 - Arbitrary File Upload leads to Remote Code Execution (RCE) | |
Weaknesses | CWE-434 CWE-94 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-08T22:40:56.389Z
Reserved: 2025-09-04T19:18:09.498Z
Link: CVE-2025-58745

No data.

Status : Received
Published: 2025-09-08T23:15:35.790
Modified: 2025-09-08T23:15:35.790
Link: CVE-2025-58745

No data.

No data.