CVE-2025-58452: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA
WeGIA is a Web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the listar_despachos.php endpoint of the WeGIA application prior to version 3.4.11. This vulnerability allows attackers to inject malicious scripts in the id_memorando parameter. Version 3.4.11 contains a patch.
AI Analysis
Technical Summary
CVE-2025-58452 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web management application developed by LabRedesCefetRJ, specifically affecting versions prior to 3.4.11. The vulnerability exists in the listar_despachos.php endpoint, where the id_memorando parameter is improperly sanitized, allowing attackers to inject malicious scripts that are then reflected back to users. Reflected XSS vulnerabilities occur when untrusted input is included in web pages without proper neutralization, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, credential theft, or redirection to malicious sites. The vulnerability has a CVSS 4.0 base score of 2.1, indicating low severity, primarily because it requires user interaction and does not affect confidentiality, integrity, or availability directly. The vulnerability was patched in version 3.4.11 of WeGIA. No known exploits are currently reported in the wild. The vulnerability falls under CWE-79, which is a common web application security issue related to improper input neutralization during web page generation. The attack vector is network-based, with low attack complexity, no privileges or authentication required, but user interaction is necessary for exploitation. The scope is limited to the web application itself, and the impact on confidentiality, integrity, and availability is minimal or none.
Potential Impact
For European organizations using WeGIA to manage charitable institutions, this vulnerability could allow attackers to execute malicious scripts in the browsers of users who interact with the vulnerable endpoint, potentially leading to theft of session cookies, unauthorized actions on behalf of users, or phishing attacks. Although the CVSS score is low, the impact could be more significant if attackers leverage this vulnerability as part of a broader attack chain, especially targeting users with elevated privileges. Given that WeGIA is specialized software for charitable institutions, the affected organizations might include NGOs and non-profits across Europe. The direct impact on critical infrastructure or large enterprises is likely limited. However, exploitation could undermine trust in these organizations and lead to data exposure or fraud. Since no known exploits are reported, the immediate risk is low, but unpatched instances remain vulnerable to targeted attacks, especially in environments where users may be less security-aware.
Mitigation Recommendations
Organizations should promptly update WeGIA installations to version 3.4.11 or later, where the vulnerability has been patched. In addition to applying the vendor patch, administrators should implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the id_memorando parameter. User input validation and output encoding should be enforced at the application level to prevent injection of malicious scripts. Security awareness training for users can reduce the risk of successful exploitation by making users cautious about clicking on suspicious links. Regular security assessments and penetration testing of the WeGIA application should be conducted to identify any residual or new vulnerabilities. Monitoring web server logs for unusual requests to listar_despachos.php can help detect attempted exploitation. Finally, organizations should ensure that session management is robust, using HttpOnly and Secure flags on cookies to mitigate the impact of potential XSS attacks.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom, Netherlands, Belgium
CVE-2025-58452: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA
Description
WeGIA is a Web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the listar_despachos.php endpoint of the WeGIA application prior to version 3.4.11. This vulnerability allows attackers to inject malicious scripts in the id_memorando parameter. Version 3.4.11 contains a patch.
AI-Powered Analysis
Technical Analysis
CVE-2025-58452 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web management application developed by LabRedesCefetRJ, specifically affecting versions prior to 3.4.11. The vulnerability exists in the listar_despachos.php endpoint, where the id_memorando parameter is improperly sanitized, allowing attackers to inject malicious scripts that are then reflected back to users. Reflected XSS vulnerabilities occur when untrusted input is included in web pages without proper neutralization, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, credential theft, or redirection to malicious sites. The vulnerability has a CVSS 4.0 base score of 2.1, indicating low severity, primarily because it requires user interaction and does not affect confidentiality, integrity, or availability directly. The vulnerability was patched in version 3.4.11 of WeGIA. No known exploits are currently reported in the wild. The vulnerability falls under CWE-79, which is a common web application security issue related to improper input neutralization during web page generation. The attack vector is network-based, with low attack complexity, no privileges or authentication required, but user interaction is necessary for exploitation. The scope is limited to the web application itself, and the impact on confidentiality, integrity, and availability is minimal or none.
Potential Impact
For European organizations using WeGIA to manage charitable institutions, this vulnerability could allow attackers to execute malicious scripts in the browsers of users who interact with the vulnerable endpoint, potentially leading to theft of session cookies, unauthorized actions on behalf of users, or phishing attacks. Although the CVSS score is low, the impact could be more significant if attackers leverage this vulnerability as part of a broader attack chain, especially targeting users with elevated privileges. Given that WeGIA is specialized software for charitable institutions, the affected organizations might include NGOs and non-profits across Europe. The direct impact on critical infrastructure or large enterprises is likely limited. However, exploitation could undermine trust in these organizations and lead to data exposure or fraud. Since no known exploits are reported, the immediate risk is low, but unpatched instances remain vulnerable to targeted attacks, especially in environments where users may be less security-aware.
Mitigation Recommendations
Organizations should promptly update WeGIA installations to version 3.4.11 or later, where the vulnerability has been patched. In addition to applying the vendor patch, administrators should implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the id_memorando parameter. User input validation and output encoding should be enforced at the application level to prevent injection of malicious scripts. Security awareness training for users can reduce the risk of successful exploitation by making users cautious about clicking on suspicious links. Regular security assessments and penetration testing of the WeGIA application should be conducted to identify any residual or new vulnerabilities. Monitoring web server logs for unusual requests to listar_despachos.php can help detect attempted exploitation. Finally, organizations should ensure that session management is robust, using HttpOnly and Secure flags on cookies to mitigate the impact of potential XSS attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-01T20:03:06.533Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf5946d5a2966cfc83c8f2
Added to database: 9/8/2025, 10:31:34 PM
Last enriched: 9/16/2025, 1:07:27 AM
Last updated: 10/30/2025, 1:24:10 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumCVE-2025-63608: n/a
HighCVE-2025-10317: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.Cart
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighCVE-2025-53883: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in SUSE Container suse manager 5.0
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.