CVE-2025-61665: CWE-287: Improper Authentication in LabRedesCefetRJ WeGIA
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.
AI Analysis
Technical Summary
CVE-2025-61665 is a vulnerability classified under CWE-287 (Improper Authentication) and CWE-200 (Information Exposure) found in WeGIA, an open source web management system tailored for charitable institutions. The flaw exists in versions 3.4.12 and earlier, specifically in the get_relatorios_socios.php endpoint, which handles reports related to members. Due to broken access control, this endpoint does not enforce authentication or authorization checks, allowing any unauthenticated attacker to retrieve sensitive personal and financial information of members. The vulnerability is remotely exploitable over the network without any user interaction or privileges, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N) highlights that the attack requires no authentication, has low complexity, and results in high confidentiality impact with limited integrity and availability impact. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a critical threat. The vendor has addressed this issue in version 3.5.0 by implementing proper authentication and authorization controls on the vulnerable endpoint. Organizations running affected versions should prioritize upgrading and reviewing access controls to prevent unauthorized data disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive personal and financial data of members managed through WeGIA. Given the focus on charitable institutions, the exposure of donor and beneficiary information could lead to privacy violations, reputational damage, and regulatory penalties under GDPR and other data protection laws. Unauthorized data access could also facilitate identity theft, fraud, or targeted phishing attacks. The lack of authentication requirements means attackers can exploit this remotely without any credentials, increasing the likelihood of exploitation. The impact is particularly severe for organizations that rely heavily on WeGIA for managing sensitive stakeholder information. Additionally, the breach of trust could undermine donor confidence and affect funding. The vulnerability does not directly impact system integrity or availability but the confidentiality breach alone warrants urgent remediation.
Mitigation Recommendations
European organizations should immediately upgrade WeGIA to version 3.5.0 or later, where the vulnerability is fixed. Until upgrade is possible, restrict network access to the get_relatorios_socios.php endpoint using firewall rules or web application firewalls (WAFs) to block unauthenticated requests. Conduct thorough access control audits on all endpoints handling sensitive data to ensure proper authentication and authorization mechanisms are in place. Implement logging and monitoring to detect any unusual access patterns to sensitive reports. Educate staff about the risks and ensure incident response plans are updated to handle potential data breaches. If feasible, perform penetration testing to verify that no unauthorized access is possible post-mitigation. Finally, review data retention policies to minimize the amount of sensitive data stored and ensure compliance with GDPR requirements.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-61665: CWE-287: Improper Authentication in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-61665 is a vulnerability classified under CWE-287 (Improper Authentication) and CWE-200 (Information Exposure) found in WeGIA, an open source web management system tailored for charitable institutions. The flaw exists in versions 3.4.12 and earlier, specifically in the get_relatorios_socios.php endpoint, which handles reports related to members. Due to broken access control, this endpoint does not enforce authentication or authorization checks, allowing any unauthenticated attacker to retrieve sensitive personal and financial information of members. The vulnerability is remotely exploitable over the network without any user interaction or privileges, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N) highlights that the attack requires no authentication, has low complexity, and results in high confidentiality impact with limited integrity and availability impact. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a critical threat. The vendor has addressed this issue in version 3.5.0 by implementing proper authentication and authorization controls on the vulnerable endpoint. Organizations running affected versions should prioritize upgrading and reviewing access controls to prevent unauthorized data disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive personal and financial data of members managed through WeGIA. Given the focus on charitable institutions, the exposure of donor and beneficiary information could lead to privacy violations, reputational damage, and regulatory penalties under GDPR and other data protection laws. Unauthorized data access could also facilitate identity theft, fraud, or targeted phishing attacks. The lack of authentication requirements means attackers can exploit this remotely without any credentials, increasing the likelihood of exploitation. The impact is particularly severe for organizations that rely heavily on WeGIA for managing sensitive stakeholder information. Additionally, the breach of trust could undermine donor confidence and affect funding. The vulnerability does not directly impact system integrity or availability but the confidentiality breach alone warrants urgent remediation.
Mitigation Recommendations
European organizations should immediately upgrade WeGIA to version 3.5.0 or later, where the vulnerability is fixed. Until upgrade is possible, restrict network access to the get_relatorios_socios.php endpoint using firewall rules or web application firewalls (WAFs) to block unauthenticated requests. Conduct thorough access control audits on all endpoints handling sensitive data to ensure proper authentication and authorization mechanisms are in place. Implement logging and monitoring to detect any unusual access patterns to sensitive reports. Educate staff about the risks and ensure incident response plans are updated to handle potential data breaches. If feasible, perform penetration testing to verify that no unauthorized access is possible post-mitigation. Finally, review data retention policies to minimize the amount of sensitive data stored and ensure compliance with GDPR requirements.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-29T20:25:16.179Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68df13500005234f78f7269e
Added to database: 10/3/2025, 12:05:36 AM
Last enriched: 10/10/2025, 6:33:21 AM
Last updated: 11/17/2025, 3:50:04 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13282: CWE-352 Cross-Site Request Forgery (CSRF) in Chunghwa Telecom TenderDocTransfer
HighCVE-2025-13260: SQL Injection in Campcodes Supplier Management System
MediumCVE-2025-13259: SQL Injection in Campcodes Supplier Management System
MediumCVE-2025-10460: CWE-20 Improper Input Validation in BEIMS Contractor Web
CriticalCVE-2025-13258: Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.