Skip to main content

CVE-2025-55171: CWE-287: Improper Authentication in LabRedesCefetRJ WeGIA

High
VulnerabilityCVE-2025-55171cvecve-2025-55171cwe-287
Published: Tue Aug 12 2025 (08/12/2025, 20:17:19 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, the application does not check authentication at endpoint /html/personalizacao_remover.php allowing anonymous attacker (without login) to delete any Image files at endpoint /html/personalizacao_remover.php by defining imagem_0 as image id to delete. This issue has been patched in version 3.4.8.

AI-Powered Analysis

AILast updated: 08/12/2025, 20:47:47 UTC

Technical Analysis

CVE-2025-55171 is a high-severity vulnerability classified under CWE-287 (Improper Authentication) affecting the open-source web management application WeGIA, developed by LabRedesCefetRJ. WeGIA is designed primarily for Portuguese-speaking users and charitable institutions. The vulnerability exists in versions prior to 3.4.8, where the application fails to enforce authentication checks on the endpoint /html/personalizacao_remover.php. This flaw allows an unauthenticated attacker to invoke this endpoint and delete image files arbitrarily by specifying the parameter imagem_0 with the target image ID. Since no authentication or user interaction is required, the attack surface is broad and easily exploitable remotely over the network. The vulnerability impacts availability by enabling attackers to delete image resources, potentially disrupting the normal operation or presentation of the affected web application. The issue was addressed and patched in version 3.4.8 of WeGIA. The CVSS v3.1 score of 7.5 reflects the network attack vector, low attack complexity, no privileges or user interaction needed, and a high impact on availability, while confidentiality and integrity remain unaffected. No known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, particularly those using WeGIA to manage web content for charitable or community-focused institutions, this vulnerability poses a significant risk to service availability and operational continuity. The ability for unauthenticated attackers to delete image files can lead to defacement, loss of critical visual content, and disruption of user experience. This could damage the reputation of affected organizations and erode trust among stakeholders and beneficiaries. Additionally, organizations may face increased operational costs due to recovery efforts and potential downtime. Since WeGIA targets Portuguese language users and charitable institutions, European countries with strong Portuguese-speaking communities or organizations that adopt this software are at risk. The vulnerability does not directly compromise confidentiality or data integrity but can indirectly affect organizational credibility and service reliability.

Mitigation Recommendations

Organizations should immediately upgrade WeGIA installations to version 3.4.8 or later, where the authentication check on the /html/personalizacao_remover.php endpoint has been implemented. Until the upgrade is applied, administrators should consider implementing network-level access controls such as IP whitelisting or web application firewall (WAF) rules to restrict access to the vulnerable endpoint. Monitoring web server logs for unusual or unauthorized requests to /html/personalizacao_remover.php can help detect exploitation attempts. Additionally, backing up image files regularly will facilitate recovery if deletion occurs. For organizations unable to upgrade promptly, temporarily disabling or restricting the endpoint through configuration changes or URL rewriting can mitigate risk. Security teams should also educate users and administrators about the importance of applying patches and monitoring for suspicious activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-07T18:27:23.308Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ba4f3ad5a09ad0036643d

Added to database: 8/12/2025, 8:32:51 PM

Last enriched: 8/12/2025, 8:47:47 PM

Last updated: 8/13/2025, 6:25:20 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats