Skip to main content

CVE-2025-53525: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA

Low
VulnerabilityCVE-2025-53525cvecve-2025-53525cwe-79
Published: Mon Jul 07 2025 (07/07/2025, 16:30:25 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the profile_familiar.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the id_dependente parameter. This vulnerability is fixed in 3.4.3.

AI-Powered Analysis

AILast updated: 07/07/2025, 16:55:58 UTC

Technical Analysis

CVE-2025-53525 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web application, a management platform designed for charitable institutions developed by LabRedesCefetRJ. The vulnerability exists in the profile_familiar.php endpoint, specifically in the handling of the id_dependente parameter. Due to improper neutralization of input during web page generation (CWE-79), an attacker can inject malicious JavaScript code that is reflected back to the user without proper sanitization or encoding. This allows execution of arbitrary scripts in the context of the victim's browser session. The vulnerability affects all versions prior to 3.4.3, where the issue has been fixed. The CVSS 4.0 base score is 2.0, indicating a low severity primarily because exploitation requires user interaction (UI:A), no privileges or authentication are needed (PR:N, AT:N), and the impact on confidentiality, integrity, and availability is minimal (VC:N, VI:N, VA:N). The attack vector is network-based (AV:N), and the scope is limited (S:I). No known exploits are currently reported in the wild. The vulnerability could be leveraged in phishing or social engineering attacks to steal session cookies, perform actions on behalf of users, or deliver malware, but the impact is constrained by the nature of the application and the reflected XSS vector.

Potential Impact

For European organizations using WeGIA to manage charitable institutions, this vulnerability could lead to targeted attacks against users of the platform, such as staff or volunteers. Successful exploitation could result in session hijacking, unauthorized actions performed on behalf of users, or delivery of malicious payloads via the victim's browser. While the direct impact on system integrity or data confidentiality is limited, the reputational damage and potential data exposure from compromised user sessions could be significant, especially for organizations handling sensitive donor or beneficiary information. Additionally, exploitation could facilitate further attacks within the organization's network if users have elevated privileges. Given the low CVSS score and lack of known exploits, the immediate risk is low, but the vulnerability should not be ignored due to the sensitive nature of charitable institution data and the potential for social engineering attacks.

Mitigation Recommendations

Organizations should promptly upgrade WeGIA installations to version 3.4.3 or later, where the vulnerability is patched. In addition to patching, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Input validation and output encoding should be enforced on all user-supplied data, especially parameters reflected in responses. Security teams should monitor web application logs for suspicious requests targeting the id_dependente parameter. User awareness training should emphasize caution with unsolicited links or emails that could exploit reflected XSS vulnerabilities. Where possible, implement multi-factor authentication (MFA) to reduce the impact of session hijacking. Finally, conduct regular security assessments and penetration testing on the WeGIA platform to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-02T15:15:11.514Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686bf83b6f40f0eb72ea9d73

Added to database: 7/7/2025, 4:39:23 PM

Last enriched: 7/7/2025, 4:55:58 PM

Last updated: 7/7/2025, 8:54:37 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats