{"vulnerability": "CVE-2025-23030", "sightings": [{"uuid": "7f1f30cf-b65f-4531-a8f5-266f72974f0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23030", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3fmzv432p", "content": "", "creation_timestamp": "2025-01-14T01:18:38.863698Z"}, {"uuid": "3d512001-4a46-4d1d-a9c7-b9849c0da5cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23030", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824831940627455", "content": "", "creation_timestamp": "2025-01-14T04:31:41.907312Z"}, {"uuid": "f857e45e-50c1-4014-9616-725ba8fc9b01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23030", "type": "seen", "source": "https://t.me/cvedetector/15214", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23030 - WeGIA Reflected Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23030 \nPublished : Jan. 14, 2025, 1:15 a.m. | 37\u00a0minutes ago \nDescription : WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `cadastro_funcionario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `cpf` parameter. The application fails to validate and sanitize user inputs in the `cpf` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T03:07:16.000000Z"}, {"uuid": "5e433f9c-7e9f-407a-8a59-6c478289e1da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23030", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19612", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6699\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability classified as problematic has been found in LabRedesCefetRJ WeGIA 3.4.0. This affects an unknown part of the file /html/funcionario/cadastro_funcionario.php of the component Cadastro de Funcion\u00e1rio. The manipulation of the argument Nome/Sobrenome leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This is a different issue than CVE-2025-23030. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-06-26T15:31:12.243Z\n\ud83d\udccf Modified: 2025-06-26T15:31:12.243Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.313965\n2. https://vuldb.com/?ctiid.313965\n3. https://vuldb.com/?submit.597401\n4. https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README7.md", "creation_timestamp": "2025-06-26T15:52:36.000000Z"}, {"uuid": "699ab94f-821b-46a9-bbeb-89cb3f3c3b9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23030", "type": "seen", "source": "Telegram/gx5cvBJht958nR2RaXHdYBRNj--A_SjnKelGAV9IdOr0A5Rl", "content": "", "creation_timestamp": "2025-02-14T10:09:22.000000Z"}]}