{"vulnerability": "CVE-2025-22133", "sightings": [{"uuid": "99cb2e48-b627-4963-9f07-20f0fc597036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113789358208827936", "content": "", "creation_timestamp": "2025-01-07T22:10:14.989283Z"}, {"uuid": "1d1d9f30-0597-4ea0-84cf-35b7b1debf1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf6ofmiwrn22", "content": "", "creation_timestamp": "2025-01-07T22:16:03.259892Z"}, {"uuid": "c211af72-3bfb-4935-8263-a62561259d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf6pvvdd2l2y", "content": "", "creation_timestamp": "2025-01-07T22:43:04.137192Z"}, {"uuid": "858f0ceb-7e9d-4eb0-bebd-a8d1d6849230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf6pvvlobn2r", "content": "", "creation_timestamp": "2025-01-07T22:43:04.898756Z"}, {"uuid": "00d64d46-64b2-4608-bb01-19e6be708a07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113789508728027417", "content": "", "creation_timestamp": "2025-01-07T22:48:34.023770Z"}, {"uuid": "de0df4b0-3534-4cf6-aac2-7232ec13767c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lyel7q74232t", "content": "", "creation_timestamp": "2025-09-09T01:33:43.938928Z"}, {"uuid": "7ea69986-b929-403b-984b-b4505fdc3139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/586", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22133\n\ud83d\udd39 Description: WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.\n\ud83d\udccf Published: 2025-01-07T22:07:13.958Z\n\ud83d\udccf Modified: 2025-01-07T22:07:13.958Z\n\ud83d\udd17 References:\n1. https://github.com/nilsonLazarin/WeGIA/security/advisories/GHSA-mjgr-2jxv-v8qf\n2. https://github.com/nilsonLazarin/WeGIA/commit/a08f04de96d3caec85496d7a89a5b82d1960d9dd", "creation_timestamp": "2025-01-07T22:36:49.000000Z"}, {"uuid": "31e5b391-1f5b-44ca-9422-4052ae6a633a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "seen", "source": "https://gist.github.com/Darkcrai86/45c460a2e6e31b85cccfbd496d9667d9", "content": "", "creation_timestamp": "2025-08-30T10:23:32.000000Z"}, {"uuid": "7cd89dde-58d2-439a-bccd-d7945fd442bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22133", "type": "seen", "source": "https://t.me/cvedetector/14611", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22133 - WeGIA File Upload Vulnerability (Remote Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2025-22133 \nPublished : Jan. 7, 2025, 10:15 p.m. | 34\u00a0minutes ago \nDescription : WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T23:55:31.000000Z"}]}