CVE-2025-61665: CWE-287: Improper Authentication in LabRedesCefetRJ WeGIA
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.
AI Analysis
Technical Summary
CVE-2025-61665 is a high-severity vulnerability affecting WeGIA, an open-source web management platform primarily used by charitable institutions. The vulnerability is classified under CWE-287 (Improper Authentication) and CWE-200 (Information Exposure). Specifically, versions of WeGIA prior to 3.5.0 contain a broken access control flaw in the get_relatorios_socios.php endpoint. This flaw allows unauthenticated attackers to bypass authentication and authorization mechanisms, granting direct access to sensitive personal and financial data of members managed by the platform. The vulnerability is remotely exploitable over the network without any user interaction or privileges, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N). The impact on confidentiality is high, as attackers can retrieve sensitive information without any barriers. The vulnerability has a CVSS score of 8.7, reflecting its critical impact on data confidentiality and the ease of exploitation. Although no known exploits are currently reported in the wild, the presence of such a flaw in a platform used by charitable organizations poses a significant risk of data breaches and privacy violations. The issue was addressed in WeGIA version 3.5.0, which implements proper access control checks to prevent unauthorized data access. Organizations using affected versions should prioritize upgrading to the patched release to mitigate this risk.
Potential Impact
For European organizations, particularly charitable institutions and NGOs utilizing WeGIA, this vulnerability could lead to severe data breaches involving personal and financial information of donors, members, and beneficiaries. Exposure of such sensitive data can result in loss of trust, reputational damage, regulatory penalties under GDPR, and potential financial fraud. The breach of confidentiality may also lead to identity theft and targeted phishing attacks against affected individuals. Since the vulnerability requires no authentication and can be exploited remotely, attackers could automate data extraction at scale, increasing the risk of widespread data compromise. The impact extends beyond individual organizations to the broader charitable sector, potentially undermining public confidence in nonprofit data handling practices across Europe.
Mitigation Recommendations
1. Immediate upgrade to WeGIA version 3.5.0 or later, which contains the fix for this vulnerability. 2. If upgrading is not immediately feasible, implement network-level access controls such as IP whitelisting or VPN restrictions to limit access to the get_relatorios_socios.php endpoint. 3. Conduct thorough audits of server logs to detect any unauthorized access attempts to sensitive endpoints. 4. Employ web application firewalls (WAFs) configured to block unauthenticated requests targeting sensitive API endpoints. 5. Review and enhance internal access control policies to ensure that sensitive data endpoints require proper authentication and authorization. 6. Educate staff and stakeholders about the risks of data exposure and ensure timely application of security patches. 7. Perform regular security assessments and penetration testing focused on access control mechanisms to detect similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2025-61665: CWE-287: Improper Authentication in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-61665 is a high-severity vulnerability affecting WeGIA, an open-source web management platform primarily used by charitable institutions. The vulnerability is classified under CWE-287 (Improper Authentication) and CWE-200 (Information Exposure). Specifically, versions of WeGIA prior to 3.5.0 contain a broken access control flaw in the get_relatorios_socios.php endpoint. This flaw allows unauthenticated attackers to bypass authentication and authorization mechanisms, granting direct access to sensitive personal and financial data of members managed by the platform. The vulnerability is remotely exploitable over the network without any user interaction or privileges, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N). The impact on confidentiality is high, as attackers can retrieve sensitive information without any barriers. The vulnerability has a CVSS score of 8.7, reflecting its critical impact on data confidentiality and the ease of exploitation. Although no known exploits are currently reported in the wild, the presence of such a flaw in a platform used by charitable organizations poses a significant risk of data breaches and privacy violations. The issue was addressed in WeGIA version 3.5.0, which implements proper access control checks to prevent unauthorized data access. Organizations using affected versions should prioritize upgrading to the patched release to mitigate this risk.
Potential Impact
For European organizations, particularly charitable institutions and NGOs utilizing WeGIA, this vulnerability could lead to severe data breaches involving personal and financial information of donors, members, and beneficiaries. Exposure of such sensitive data can result in loss of trust, reputational damage, regulatory penalties under GDPR, and potential financial fraud. The breach of confidentiality may also lead to identity theft and targeted phishing attacks against affected individuals. Since the vulnerability requires no authentication and can be exploited remotely, attackers could automate data extraction at scale, increasing the risk of widespread data compromise. The impact extends beyond individual organizations to the broader charitable sector, potentially undermining public confidence in nonprofit data handling practices across Europe.
Mitigation Recommendations
1. Immediate upgrade to WeGIA version 3.5.0 or later, which contains the fix for this vulnerability. 2. If upgrading is not immediately feasible, implement network-level access controls such as IP whitelisting or VPN restrictions to limit access to the get_relatorios_socios.php endpoint. 3. Conduct thorough audits of server logs to detect any unauthorized access attempts to sensitive endpoints. 4. Employ web application firewalls (WAFs) configured to block unauthenticated requests targeting sensitive API endpoints. 5. Review and enhance internal access control policies to ensure that sensitive data endpoints require proper authentication and authorization. 6. Educate staff and stakeholders about the risks of data exposure and ensure timely application of security patches. 7. Perform regular security assessments and penetration testing focused on access control mechanisms to detect similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-29T20:25:16.179Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68df13500005234f78f7269e
Added to database: 10/3/2025, 12:05:36 AM
Last enriched: 10/3/2025, 12:13:21 AM
Last updated: 10/3/2025, 7:41:02 AM
Views: 7
Related Threats
CVE-2025-61671
UnknownCVE-2025-59536: CWE-94: Improper Control of Generation of Code ('Code Injection') in anthropics claude-code
HighCVE-2025-61847
UnknownCVE-2025-59300: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59299: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.