CVE-2025-53935: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `personalizacao_selecao.php` endpoint of the WeGIA application prior to version 3.4.5. This vulnerability allows attackers to inject malicious scripts in the `id` parameter. Version 3.4.5 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-53935 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web management application developed by LabRedesCefetRJ. WeGIA is an open-source platform primarily targeting Portuguese-speaking charitable institutions. The vulnerability exists in the 'personalizacao_selecao.php' endpoint, specifically in the handling of the 'id' parameter. Prior to version 3.4.5, this parameter is not properly sanitized or neutralized, allowing an attacker to inject malicious JavaScript code that is then reflected back to the user's browser. This type of vulnerability falls under CWE-79, which concerns improper neutralization of input during web page generation. The CVSS 4.0 base score is 6.4, indicating a medium severity level. The vector indicates that the attack can be performed remotely (AV:N), requires no privileges (PR:N), and no authentication (AT:N), but does require user interaction (UI:A). The vulnerability impacts confidentiality and integrity at a low level, with a high scope and impact on security requirements. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, credential theft, or redirection to malicious sites if exploited. The issue was addressed in WeGIA version 3.4.5, which includes proper input validation and output encoding to mitigate the risk.
Potential Impact
For European organizations, especially charitable institutions and non-profits using WeGIA or similar localized web management tools, this vulnerability could lead to targeted phishing attacks or session hijacking. Attackers could exploit the reflected XSS to steal user credentials, impersonate users, or deliver malware payloads through crafted URLs. Given that WeGIA focuses on Portuguese language users, organizations in Portugal and other Lusophone communities in Europe may be particularly at risk. The impact includes potential data breaches involving sensitive donor or beneficiary information, reputational damage, and disruption of web services. Since the vulnerability requires user interaction, social engineering could be leveraged to increase exploitation success. The medium severity rating suggests that while the vulnerability is not critical, it still represents a significant risk that could be leveraged as part of a broader attack chain.
Mitigation Recommendations
Organizations should immediately update WeGIA installations to version 3.4.5 or later, where the vulnerability is patched. If immediate patching is not feasible, implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'id' parameter in the 'personalizacao_selecao.php' endpoint. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and penetration testing focusing on input validation and output encoding in all web-facing applications. Educate users and administrators about the risks of clicking on untrusted links, especially those containing URL parameters. Additionally, monitor logs for unusual access patterns or repeated attempts to inject scripts. For custom deployments, developers should review and harden input handling routines to ensure all user-supplied data is properly sanitized and encoded before rendering.
Affected Countries
Portugal, Spain, France, United Kingdom, Germany, Belgium, Netherlands
CVE-2025-53935: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `personalizacao_selecao.php` endpoint of the WeGIA application prior to version 3.4.5. This vulnerability allows attackers to inject malicious scripts in the `id` parameter. Version 3.4.5 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-53935 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web management application developed by LabRedesCefetRJ. WeGIA is an open-source platform primarily targeting Portuguese-speaking charitable institutions. The vulnerability exists in the 'personalizacao_selecao.php' endpoint, specifically in the handling of the 'id' parameter. Prior to version 3.4.5, this parameter is not properly sanitized or neutralized, allowing an attacker to inject malicious JavaScript code that is then reflected back to the user's browser. This type of vulnerability falls under CWE-79, which concerns improper neutralization of input during web page generation. The CVSS 4.0 base score is 6.4, indicating a medium severity level. The vector indicates that the attack can be performed remotely (AV:N), requires no privileges (PR:N), and no authentication (AT:N), but does require user interaction (UI:A). The vulnerability impacts confidentiality and integrity at a low level, with a high scope and impact on security requirements. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, credential theft, or redirection to malicious sites if exploited. The issue was addressed in WeGIA version 3.4.5, which includes proper input validation and output encoding to mitigate the risk.
Potential Impact
For European organizations, especially charitable institutions and non-profits using WeGIA or similar localized web management tools, this vulnerability could lead to targeted phishing attacks or session hijacking. Attackers could exploit the reflected XSS to steal user credentials, impersonate users, or deliver malware payloads through crafted URLs. Given that WeGIA focuses on Portuguese language users, organizations in Portugal and other Lusophone communities in Europe may be particularly at risk. The impact includes potential data breaches involving sensitive donor or beneficiary information, reputational damage, and disruption of web services. Since the vulnerability requires user interaction, social engineering could be leveraged to increase exploitation success. The medium severity rating suggests that while the vulnerability is not critical, it still represents a significant risk that could be leveraged as part of a broader attack chain.
Mitigation Recommendations
Organizations should immediately update WeGIA installations to version 3.4.5 or later, where the vulnerability is patched. If immediate patching is not feasible, implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'id' parameter in the 'personalizacao_selecao.php' endpoint. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and penetration testing focusing on input validation and output encoding in all web-facing applications. Educate users and administrators about the risks of clicking on untrusted links, especially those containing URL parameters. Additionally, monitor logs for unusual access patterns or repeated attempts to inject scripts. For custom deployments, developers should review and harden input handling routines to ensure all user-supplied data is properly sanitized and encoded before rendering.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-14T17:23:35.261Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6877d04ca83201eaacdc5a91
Added to database: 7/16/2025, 4:16:12 PM
Last enriched: 7/24/2025, 1:01:03 AM
Last updated: 9/12/2025, 10:58:13 AM
Views: 40
Related Threats
CVE-2025-10396: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10395: Server-Side Request Forgery in Magicblack MacCMS
MediumCVE-2025-10391: Server-Side Request Forgery in CRMEB
MediumCVE-2025-10389: Improper Authorization in CRMEB
MediumCVE-2025-10387: SQL Injection in codesiddhant Jasmin Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.