WeGIA is a Web manager for charitable institutions. The fix for CVE-2025-22133 was not enough to remediate the arbitrary file upload vulnerability. The WeGIA only check MIME types for Excel files at endpoint `/html/socio/sistema/controller/controla_xlsx.php`, which can be bypassed by using magic bytes of Excel file in a PHP file. As a result, attacker can upload webshell to the server for remote code execution. Version 3.4.11 contains an updated fix.
References
Link | Resource |
---|---|
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-hq96-gvmx-qrwp | Exploit Third Party Advisory |
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-hq96-gvmx-qrwp | Exploit Third Party Advisory |
Configurations
History
17 Sep 2025, 16:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-hq96-gvmx-qrwp - Exploit, Third Party Advisory | |
First Time |
Wegia
Wegia wegia |
|
CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* |
09 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-hq96-gvmx-qrwp - |
08 Sep 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-08 23:15
Updated : 2025-09-17 16:24
NVD link : CVE-2025-58745
Mitre link : CVE-2025-58745
CVE.ORG link : CVE-2025-58745
JSON object : View
Products Affected
wegia
- wegia