{"uuid": "7ea69986-b929-403b-984b-b4505fdc3139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/586", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22133\n\ud83d\udd39 Description: WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.\n\ud83d\udccf Published: 2025-01-07T22:07:13.958Z\n\ud83d\udccf Modified: 2025-01-07T22:07:13.958Z\n\ud83d\udd17 References:\n1. https://github.com/nilsonLazarin/WeGIA/security/advisories/GHSA-mjgr-2jxv-v8qf\n2. https://github.com/nilsonLazarin/WeGIA/commit/a08f04de96d3caec85496d7a89a5b82d1960d9dd", "creation_timestamp": "2025-01-07T22:36:49.000000Z"}