Skip to main content

CVE-2025-54078: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA

Medium
VulnerabilityCVE-2025-54078cvecve-2025-54078cwe-79
Published: Fri Jul 18 2025 (07/18/2025, 15:55:59 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in versions prior to 3.4.6 in the `personalizacao_imagem.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `err` parameter. Version 3.4.6 fixes the issue.

AI-Powered Analysis

AILast updated: 07/18/2025, 16:17:45 UTC

Technical Analysis

CVE-2025-54078 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web management application developed by LabRedesCefetRJ. WeGIA is an open-source platform primarily targeting Portuguese-speaking charitable institutions, providing web management functionalities. The vulnerability exists in versions prior to 3.4.6, specifically in the 'personalizacao_imagem.php' endpoint. The issue arises from improper neutralization of user-supplied input in the 'err' parameter, allowing an attacker to inject malicious JavaScript code that is reflected back in the HTTP response without proper sanitization or encoding. This type of vulnerability falls under CWE-79, which involves the failure to correctly sanitize input during web page generation, leading to script injection. Exploitation requires no authentication but does require user interaction, as the victim must visit a crafted URL containing the malicious payload. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), high confidentiality impact (C:H), no integrity or availability impact (I:N/A:N). This means an attacker can remotely execute a script in the context of the victim's browser, potentially stealing sensitive information such as session cookies or performing actions on behalf of the user. Although no known exploits are currently reported in the wild, the vulnerability is publicly disclosed and fixed in version 3.4.6 of WeGIA. Given the nature of the vulnerability, it primarily threatens confidentiality through session hijacking or data theft, without direct impact on system integrity or availability.

Potential Impact

For European organizations using WeGIA, particularly charitable institutions or NGOs serving Portuguese-speaking communities or operating multilingual platforms, this vulnerability poses a significant risk to user data confidentiality. Attackers could craft malicious links that, when clicked by legitimate users, execute scripts in their browsers, potentially leading to session hijacking, unauthorized access to sensitive information, or phishing attacks. This could damage the trustworthiness of the organization, lead to data breaches involving personal or donor information, and cause reputational harm. Since WeGIA is focused on charitable institutions, the impact could extend to vulnerable populations relying on these services. Additionally, the medium severity score and ease of exploitation without authentication make it a practical threat. European organizations with multilingual or Portuguese language support, or those collaborating with Portuguese-speaking partners, may be more likely to deploy WeGIA and thus be exposed. The lack of integrity or availability impact limits the threat to confidentiality, but the potential for data leakage and user session compromise remains a concern.

Mitigation Recommendations

Organizations should promptly upgrade WeGIA installations to version 3.4.6 or later, where the vulnerability is patched. If immediate upgrade is not feasible, implement web application firewall (WAF) rules to detect and block suspicious requests containing script tags or unusual payloads in the 'err' parameter. Input validation and output encoding should be enforced on all user-supplied data, especially parameters reflected in responses. Security teams should conduct code reviews and penetration testing focused on XSS vectors in the application. User awareness training is recommended to reduce the risk of users clicking on malicious links. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Monitoring web server logs for unusual request patterns targeting 'personalizacao_imagem.php' can help detect exploitation attempts. Finally, organizations should ensure session cookies are marked HttpOnly and Secure to reduce the risk of theft via XSS.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T13:22:18.206Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687a6fc6a83201eaacf4f8a0

Added to database: 7/18/2025, 4:01:10 PM

Last enriched: 7/18/2025, 4:17:45 PM

Last updated: 8/12/2025, 9:21:10 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats