CVE-2025-57765: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA
WeGIA is a Web manager for charitable institutions. Prior to 3.4.7, a Reflected Cross-Site Scripting (XSS) vulnerability was identified in the pre_cadastro_adotante.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_e parameter. This vulnerability is fixed in 3.4.7.
AI Analysis
Technical Summary
CVE-2025-57765 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web management application developed by LabRedesCefetRJ, specifically affecting versions prior to 3.4.7. The vulnerability exists in the pre_cadastro_adotante.php endpoint, where the application improperly neutralizes user input passed through the 'msg_e' parameter. This improper input handling allows an attacker to inject malicious JavaScript code that is reflected back to the user without adequate sanitization or encoding. When a victim accesses a crafted URL containing the malicious script, the script executes in the victim's browser context, potentially leading to session hijacking, theft of sensitive information, or redirection to malicious sites. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) shows that the attack can be launched remotely over the network without privileges and requires user interaction (clicking a malicious link). The impact is primarily on confidentiality, as the attacker can steal sensitive data accessible to the victim's browser session, but does not affect integrity or availability. The vulnerability has been fixed in version 3.4.7 of WeGIA. No known exploits are currently reported in the wild. This vulnerability falls under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations using WeGIA to manage charitable institutions, this vulnerability poses a risk of client-side attacks that can compromise the confidentiality of users interacting with the platform. Attackers could craft malicious URLs that, when clicked by legitimate users such as donors, volunteers, or administrators, execute scripts that steal session cookies or other sensitive data. This could lead to unauthorized access to user accounts or personal information, damaging trust and potentially violating data protection regulations like GDPR. Although the vulnerability does not directly impact system integrity or availability, the reputational damage and potential regulatory penalties from data breaches could be significant. Given that WeGIA is a niche product for charitable organizations, the impact is more pronounced for entities relying heavily on this platform for donor management and communications. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially if phishing campaigns target users to click malicious links.
Mitigation Recommendations
Organizations should immediately upgrade WeGIA installations to version 3.4.7 or later, where the vulnerability is patched. Until the upgrade is applied, administrators should implement web application firewall (WAF) rules to detect and block suspicious requests containing script tags or unusual payloads in the 'msg_e' parameter. User education is critical: training users to recognize phishing attempts and avoid clicking untrusted links can reduce exploitation likelihood. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of inline scripts and loading of external resources. Regular security assessments and code reviews should be conducted to identify and remediate similar input validation issues. Logging and monitoring for unusual access patterns or error messages related to the vulnerable endpoint can provide early detection of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-57765: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA
Description
WeGIA is a Web manager for charitable institutions. Prior to 3.4.7, a Reflected Cross-Site Scripting (XSS) vulnerability was identified in the pre_cadastro_adotante.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_e parameter. This vulnerability is fixed in 3.4.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-57765 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web management application developed by LabRedesCefetRJ, specifically affecting versions prior to 3.4.7. The vulnerability exists in the pre_cadastro_adotante.php endpoint, where the application improperly neutralizes user input passed through the 'msg_e' parameter. This improper input handling allows an attacker to inject malicious JavaScript code that is reflected back to the user without adequate sanitization or encoding. When a victim accesses a crafted URL containing the malicious script, the script executes in the victim's browser context, potentially leading to session hijacking, theft of sensitive information, or redirection to malicious sites. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) shows that the attack can be launched remotely over the network without privileges and requires user interaction (clicking a malicious link). The impact is primarily on confidentiality, as the attacker can steal sensitive data accessible to the victim's browser session, but does not affect integrity or availability. The vulnerability has been fixed in version 3.4.7 of WeGIA. No known exploits are currently reported in the wild. This vulnerability falls under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations using WeGIA to manage charitable institutions, this vulnerability poses a risk of client-side attacks that can compromise the confidentiality of users interacting with the platform. Attackers could craft malicious URLs that, when clicked by legitimate users such as donors, volunteers, or administrators, execute scripts that steal session cookies or other sensitive data. This could lead to unauthorized access to user accounts or personal information, damaging trust and potentially violating data protection regulations like GDPR. Although the vulnerability does not directly impact system integrity or availability, the reputational damage and potential regulatory penalties from data breaches could be significant. Given that WeGIA is a niche product for charitable organizations, the impact is more pronounced for entities relying heavily on this platform for donor management and communications. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially if phishing campaigns target users to click malicious links.
Mitigation Recommendations
Organizations should immediately upgrade WeGIA installations to version 3.4.7 or later, where the vulnerability is patched. Until the upgrade is applied, administrators should implement web application firewall (WAF) rules to detect and block suspicious requests containing script tags or unusual payloads in the 'msg_e' parameter. User education is critical: training users to recognize phishing attempts and avoid clicking untrusted links can reduce exploitation likelihood. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of inline scripts and loading of external resources. Regular security assessments and code reviews should be conducted to identify and remediate similar input validation issues. Logging and monitoring for unusual access patterns or error messages related to the vulnerable endpoint can provide early detection of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-19T15:16:22.917Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a754bbad5a09ad0016a78a
Added to database: 8/21/2025, 5:17:47 PM
Last enriched: 8/21/2025, 5:33:07 PM
Last updated: 8/21/2025, 5:47:48 PM
Views: 3
Related Threats
CVE-2025-27714: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-24489: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-55231: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2019
HighCVE-2025-55230: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809
HighCVE-2025-55229: CWE-347: Improper Verification of Cryptographic Signature in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.