{"vulnerability": "CVE-2025-22597", "sightings": [{"uuid": "214d6486-15cf-4278-be70-90e39bf7adb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804779615596755", "content": "", "creation_timestamp": "2025-01-10T15:32:07.112083Z"}, {"uuid": "e75f8dd2-c5d3-46f6-83b6-effc5057eab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804792804444750", "content": "", "creation_timestamp": "2025-01-10T15:35:28.259843Z"}, {"uuid": "bc31c334-8777-45c4-b6b3-c58fdc4458a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffloyuuip2m", "content": "", "creation_timestamp": "2025-01-10T16:16:15.058859Z"}, {"uuid": "f19aa140-b98c-4f84-96b9-de1fdc901688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffnjo3cti25", "content": "", "creation_timestamp": "2025-01-10T16:49:04.133729Z"}, {"uuid": "c711b210-e0dd-4d26-8d7a-35bdde0bd416", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805082288619323", "content": "", "creation_timestamp": "2025-01-10T16:49:18.697780Z"}, {"uuid": "37be9572-122f-4ec5-b88c-baa7aa2b08ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "d3d2aa52-dc72-4293-bc89-3ac3818dbd42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22597", "type": "seen", "source": "https://t.me/cvedetector/14963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22597 - WeGIA Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22597 \nPublished : Jan. 10, 2025, 4:15 p.m. | 38\u00a0minutes ago \nDescription : WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the CobrancaController.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T18:00:43.000000Z"}]}