WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8. | |
Title | WeGIA Allows Arbitrary File Upload with Remote Code Execution (RCE) | |
Weaknesses | CWE-434 CWE-94 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-08T14:52:28.078Z
Reserved: 2024-12-30T03:00:33.652Z
Link: CVE-2025-22133

Updated: 2025-01-08T14:52:14.902Z

Status : Received
Published: 2025-01-07T22:15:31.740
Modified: 2025-01-08T15:15:21.727
Link: CVE-2025-22133

No data.