{"vulnerability": "CVE-2025-24958", "sightings": [{"uuid": "156f35ea-4451-4afa-9a01-d45879102c64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24958", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113942216479395985", "content": "", "creation_timestamp": "2025-02-03T22:04:07.212701Z"}, {"uuid": "699a2188-1dbe-42b2-b089-7ff3dcf5efa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24958", "type": "seen", "source": "Telegram/Ch0gDlvH3sgrx2bzlq5gpy62Qj4PLxmfwtWdhlgpFvdubYrV", "content": "", "creation_timestamp": "2025-02-14T10:09:22.000000Z"}, {"uuid": "0e753a0b-05a9-4a64-b35b-c4abbfa793d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24958", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhckz5gqx22w", "content": "", "creation_timestamp": "2025-02-03T22:16:25.844641Z"}, {"uuid": "3a6c01b4-c8bb-43fe-8a4c-247289780ec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24958", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhcxycle2x2g", "content": "", "creation_timestamp": "2025-02-04T02:08:40.021400Z"}, {"uuid": "543f95f2-2df9-4a6a-94f6-235420f99816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24958", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4294", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24958\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-03T22:15:29.210\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2mhx-5998-46hx", "creation_timestamp": "2025-02-13T19:09:42.000000Z"}, {"uuid": "65fa0a1f-b313-462a-b718-dfe8441d3cc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24958", "type": "seen", "source": "https://t.me/cvedetector/17120", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24958 - WeGIA SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24958 \nPublished : Feb. 3, 2025, 10:15 p.m. | 23\u00a0minutes ago \nDescription : WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_tag.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to  or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T23:40:43.000000Z"}, {"uuid": "7441b9d5-e201-4209-9a26-c1c5aaf7a5e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24958", "type": "seen", "source": "Telegram/lgCM0Kvzl2ta_cmTNTlTHp748krLs6Th3KbX02dczl4v7fnx", "content": "", "creation_timestamp": "2025-02-06T02:40:20.000000Z"}]}