CVE-2025-61604: CWE-352: Cross-Site Request Forgery (CSRF) in LabRedesCefetRJ WeGIA
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Cross-Site Request Forgery (CSRF) vulnerability. The delete operation for the Almoxarifado entity is exposed via HTTP GET without CSRF protection, allowing a third-party site to trigger the action using the victim’s authenticated session. This issue is fixed in version 3.5.0.
AI Analysis
Technical Summary
CVE-2025-61604 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting WeGIA, an open-source web management platform primarily used by charitable institutions. The vulnerability exists in versions 3.4.12 and earlier. Specifically, the delete operation for the Almoxarifado entity (likely an inventory or warehouse management module) is exposed via an HTTP GET request that lacks any CSRF protection mechanisms. This means that an attacker can craft a malicious website or link that, when visited by an authenticated user of the vulnerable WeGIA instance, triggers the deletion action without the user's consent or knowledge. The vulnerability does not require any authentication or elevated privileges on the attacker’s part, but it does require the victim to be authenticated and to interact with the malicious content (user interaction). The CVSS 4.0 score of 7.1 reflects the network attack vector, low attack complexity, no privileges required, but user interaction is necessary, with a high impact on integrity and low impact on availability and confidentiality. The vulnerability is fixed in WeGIA version 3.5.0. No known exploits are currently reported in the wild. The root cause is the use of HTTP GET for a state-changing operation without anti-CSRF tokens or other protections, violating best practices for web application security. This flaw could allow unauthorized deletion of critical inventory data, potentially disrupting operations of charitable organizations relying on WeGIA for resource management.
Potential Impact
For European organizations, especially charitable institutions using WeGIA for managing inventory or resources, this vulnerability poses a significant risk to data integrity. An attacker exploiting this flaw could cause unauthorized deletion of inventory records, leading to operational disruptions, loss of critical resource tracking, and potential financial or reputational damage. Since the vulnerability requires the victim to be authenticated and to interact with malicious content, phishing or social engineering campaigns could be used to facilitate exploitation. The impact is particularly concerning for organizations with limited IT security resources or those that have not updated to the fixed version. Additionally, disruption of charitable services could have broader social implications. Although confidentiality and availability impacts are low, the integrity compromise could undermine trust in the affected organizations’ systems and data.
Mitigation Recommendations
European organizations using WeGIA should immediately upgrade to version 3.5.0 or later, where the CSRF vulnerability has been addressed. Until the upgrade is applied, organizations should implement compensating controls such as: 1) Restricting access to the WeGIA application to trusted networks or VPNs to reduce exposure. 2) Employing web application firewalls (WAFs) with custom rules to detect and block suspicious GET requests targeting the Almoxarifado delete endpoint. 3) Educating users about the risks of clicking on untrusted links or visiting suspicious websites while authenticated. 4) Monitoring application logs for unusual delete operations or patterns indicative of CSRF exploitation attempts. 5) If possible, modifying server configurations to reject state-changing operations via GET requests or to require additional verification steps. These measures can reduce the risk of exploitation while the official patch is deployed.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-61604: CWE-352: Cross-Site Request Forgery (CSRF) in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Cross-Site Request Forgery (CSRF) vulnerability. The delete operation for the Almoxarifado entity is exposed via HTTP GET without CSRF protection, allowing a third-party site to trigger the action using the victim’s authenticated session. This issue is fixed in version 3.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-61604 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting WeGIA, an open-source web management platform primarily used by charitable institutions. The vulnerability exists in versions 3.4.12 and earlier. Specifically, the delete operation for the Almoxarifado entity (likely an inventory or warehouse management module) is exposed via an HTTP GET request that lacks any CSRF protection mechanisms. This means that an attacker can craft a malicious website or link that, when visited by an authenticated user of the vulnerable WeGIA instance, triggers the deletion action without the user's consent or knowledge. The vulnerability does not require any authentication or elevated privileges on the attacker’s part, but it does require the victim to be authenticated and to interact with the malicious content (user interaction). The CVSS 4.0 score of 7.1 reflects the network attack vector, low attack complexity, no privileges required, but user interaction is necessary, with a high impact on integrity and low impact on availability and confidentiality. The vulnerability is fixed in WeGIA version 3.5.0. No known exploits are currently reported in the wild. The root cause is the use of HTTP GET for a state-changing operation without anti-CSRF tokens or other protections, violating best practices for web application security. This flaw could allow unauthorized deletion of critical inventory data, potentially disrupting operations of charitable organizations relying on WeGIA for resource management.
Potential Impact
For European organizations, especially charitable institutions using WeGIA for managing inventory or resources, this vulnerability poses a significant risk to data integrity. An attacker exploiting this flaw could cause unauthorized deletion of inventory records, leading to operational disruptions, loss of critical resource tracking, and potential financial or reputational damage. Since the vulnerability requires the victim to be authenticated and to interact with malicious content, phishing or social engineering campaigns could be used to facilitate exploitation. The impact is particularly concerning for organizations with limited IT security resources or those that have not updated to the fixed version. Additionally, disruption of charitable services could have broader social implications. Although confidentiality and availability impacts are low, the integrity compromise could undermine trust in the affected organizations’ systems and data.
Mitigation Recommendations
European organizations using WeGIA should immediately upgrade to version 3.5.0 or later, where the CSRF vulnerability has been addressed. Until the upgrade is applied, organizations should implement compensating controls such as: 1) Restricting access to the WeGIA application to trusted networks or VPNs to reduce exposure. 2) Employing web application firewalls (WAFs) with custom rules to detect and block suspicious GET requests targeting the Almoxarifado delete endpoint. 3) Educating users about the risks of clicking on untrusted links or visiting suspicious websites while authenticated. 4) Monitoring application logs for unusual delete operations or patterns indicative of CSRF exploitation attempts. 5) If possible, modifying server configurations to reject state-changing operations via GET requests or to require additional verification steps. These measures can reduce the risk of exploitation while the official patch is deployed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-26T16:25:25.151Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68df13500005234f78f726aa
Added to database: 10/3/2025, 12:05:36 AM
Last enriched: 10/3/2025, 12:14:12 AM
Last updated: 10/3/2025, 5:22:04 AM
Views: 4
Related Threats
CVE-2025-61847
UnknownCVE-2025-59300: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59299: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59298: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59297: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.