Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58159: CWE-434: Unrestricted Upload of File with Dangerous Type in LabRedesCefetRJ WeGIA

0
Critical
VulnerabilityCVE-2025-58159cvecve-2025-58159cwe-434cwe-94
Published: Fri Aug 29 2025 (08/29/2025, 22:15:12 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is a Web manager for charitable institutions. Prior to version 3.4.11, a remote code execution vulnerability was identified, caused by improper validation of uploaded files. The application allows an attacker to upload files with arbitrary filenames, including those with a .php extension. Because the uploaded file is written directly to disk without adequate sanitization or extension restrictions, a spreadsheet file followed by PHP code can be uploaded and executed on the server, leading to arbitrary code execution. This is due to insufficient mitigation of CVE-2025-22133. This issue has been patched in version 3.4.11.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:33:29 UTC

Technical Analysis

CVE-2025-58159 is a critical remote code execution (RCE) vulnerability affecting versions of the WeGIA web management application prior to 3.4.11. WeGIA is a platform used by charitable institutions to manage their web presence and operations. The vulnerability arises from improper validation and sanitization of uploaded files, specifically allowing attackers to upload files with arbitrary filenames, including those with dangerous extensions such as .php. The application fails to restrict or sanitize file extensions adequately, enabling an attacker to upload a crafted file that appears to be a spreadsheet but contains embedded PHP code. When this file is saved to disk and subsequently executed by the web server, it leads to arbitrary code execution on the server. This vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-94 (Improper Control of Generation of Code), indicating both the unsafe file upload handling and the execution of malicious code. The issue is a direct consequence of insufficient mitigation of a prior vulnerability (CVE-2025-22133). The vulnerability has been assigned a CVSS v3.1 base score of 10.0, reflecting its critical severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability with a scope change. Although no known exploits have been reported in the wild yet, the potential for exploitation is high due to the ease of uploading executable files and the direct impact on server control. The vulnerability was publicly disclosed on August 29, 2025, and fixed in WeGIA version 3.4.11. Organizations running affected versions should prioritize upgrading to the patched release to eliminate this critical risk.

Potential Impact

For European organizations, especially charitable institutions and NGOs using WeGIA, this vulnerability poses a severe threat. Successful exploitation allows attackers to execute arbitrary code on the web server, potentially leading to full system compromise. This can result in data breaches exposing sensitive donor and beneficiary information, disruption of organizational operations, defacement of websites, and use of compromised servers as pivot points for further attacks within the network. Given the critical nature of the vulnerability and the high CVSS score, the impact on confidentiality, integrity, and availability is substantial. Additionally, the compromise of charitable organizations can erode public trust and lead to regulatory penalties under GDPR if personal data is exposed. The lack of required user interaction and the network attack vector increase the likelihood of exploitation, making this a pressing concern for European entities relying on WeGIA for their web management.

Mitigation Recommendations

1. Immediate upgrade to WeGIA version 3.4.11 or later, where the vulnerability is patched, is the most effective mitigation. 2. Implement strict file upload validation controls: enforce whitelisting of allowed file types/extensions, reject files with executable extensions such as .php, and verify MIME types server-side. 3. Employ server-side sanitization of uploaded filenames to remove or neutralize dangerous characters and extensions. 4. Configure web server settings to prevent execution of uploaded files in directories used for file uploads, e.g., disable PHP execution in upload folders via .htaccess or equivalent. 5. Monitor web server logs for suspicious upload activity or execution attempts of unexpected file types. 6. Conduct regular security audits and penetration testing focusing on file upload functionalities. 7. Educate administrators and developers on secure coding practices related to file handling to prevent recurrence. 8. If immediate upgrade is not feasible, consider temporary mitigations such as restricting upload permissions to trusted users only and isolating the application environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-27T13:34:56.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b22a90ad5a09ad007bf759

Added to database: 8/29/2025, 10:32:48 PM

Last enriched: 9/7/2025, 12:33:29 AM

Last updated: 10/14/2025, 11:44:08 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats