Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58452: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA

0
Low
VulnerabilityCVE-2025-58452cvecve-2025-58452cwe-79
Published: Mon Sep 08 2025 (09/08/2025, 22:26:24 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is a Web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the listar_despachos.php endpoint of the WeGIA application prior to version 3.4.11. This vulnerability allows attackers to inject malicious scripts in the id_memorando parameter. Version 3.4.11 contains a patch.

AI-Powered Analysis

AILast updated: 09/16/2025, 01:07:27 UTC

Technical Analysis

CVE-2025-58452 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WeGIA web management application developed by LabRedesCefetRJ, specifically affecting versions prior to 3.4.11. The vulnerability exists in the listar_despachos.php endpoint, where the id_memorando parameter is improperly sanitized, allowing attackers to inject malicious scripts that are then reflected back to users. Reflected XSS vulnerabilities occur when untrusted input is included in web pages without proper neutralization, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, credential theft, or redirection to malicious sites. The vulnerability has a CVSS 4.0 base score of 2.1, indicating low severity, primarily because it requires user interaction and does not affect confidentiality, integrity, or availability directly. The vulnerability was patched in version 3.4.11 of WeGIA. No known exploits are currently reported in the wild. The vulnerability falls under CWE-79, which is a common web application security issue related to improper input neutralization during web page generation. The attack vector is network-based, with low attack complexity, no privileges or authentication required, but user interaction is necessary for exploitation. The scope is limited to the web application itself, and the impact on confidentiality, integrity, and availability is minimal or none.

Potential Impact

For European organizations using WeGIA to manage charitable institutions, this vulnerability could allow attackers to execute malicious scripts in the browsers of users who interact with the vulnerable endpoint, potentially leading to theft of session cookies, unauthorized actions on behalf of users, or phishing attacks. Although the CVSS score is low, the impact could be more significant if attackers leverage this vulnerability as part of a broader attack chain, especially targeting users with elevated privileges. Given that WeGIA is specialized software for charitable institutions, the affected organizations might include NGOs and non-profits across Europe. The direct impact on critical infrastructure or large enterprises is likely limited. However, exploitation could undermine trust in these organizations and lead to data exposure or fraud. Since no known exploits are reported, the immediate risk is low, but unpatched instances remain vulnerable to targeted attacks, especially in environments where users may be less security-aware.

Mitigation Recommendations

Organizations should promptly update WeGIA installations to version 3.4.11 or later, where the vulnerability has been patched. In addition to applying the vendor patch, administrators should implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the id_memorando parameter. User input validation and output encoding should be enforced at the application level to prevent injection of malicious scripts. Security awareness training for users can reduce the risk of successful exploitation by making users cautious about clicking on suspicious links. Regular security assessments and penetration testing of the WeGIA application should be conducted to identify any residual or new vulnerabilities. Monitoring web server logs for unusual requests to listar_despachos.php can help detect attempted exploitation. Finally, organizations should ensure that session management is robust, using HttpOnly and Secure flags on cookies to mitigate the impact of potential XSS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-01T20:03:06.533Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf5946d5a2966cfc83c8f2

Added to database: 9/8/2025, 10:31:34 PM

Last enriched: 9/16/2025, 1:07:27 AM

Last updated: 10/30/2025, 1:24:10 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats