WeGIA is a Web manager for charitable institutions. The fix for CVE-2025-22133 was not enough to remediate the arbitrary file upload vulnerability. The WeGIA only check MIME types for Excel files at endpoint `/html/socio/sistema/controller/controla_xlsx.php`, which can be bypassed by using magic bytes of Excel file in a PHP file. As a result, attacker can upload webshell to the server for remote code execution. Version 3.4.11 contains an updated fix.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-hq96-gvmx-qrwp | Exploit Third Party Advisory |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-hq96-gvmx-qrwp | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-08 23:15
Updated : 2025-09-17 16:24
NVD link : CVE-2025-58745
Mitre link : CVE-2025-58745
CVE.ORG link : CVE-2025-58745
JSON object : View
Products Affected
wegia
- wegia
