CVE-2025-62361: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to 3.5.0, an Open Redirect vulnerability was identified in the control.php endpoint of the WeGIA application, specifically in the nextPage parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This vulnerability is fixed in 3.5.0.
AI Analysis
Technical Summary
CVE-2025-62361 identifies an Open Redirect vulnerability (CWE-601) in the WeGIA web management system developed by LabRedesCefetRJ, targeting Portuguese language institutions. The vulnerability is located in the control.php endpoint, specifically within the nextPage parameter when used with the metodo=listarTodos and nomeClasse=AlmoxarifeControle parameters. Prior to version 3.5.0, this parameter does not properly validate or sanitize URLs, allowing an attacker to craft URLs that redirect users to arbitrary external domains. This redirection can be exploited to conduct phishing campaigns by luring users into malicious sites that mimic legitimate services, distribute malware payloads, or steal user credentials by impersonation. The vulnerability requires no privileges or authentication but depends on user interaction to click or be redirected via a crafted URL. The CVSS 4.8 score reflects a medium severity, considering the network attack vector, low attack complexity, no privileges required, but user interaction needed. The vulnerability affects all WeGIA versions prior to 3.5.0, and the vendor has addressed the issue in the 3.5.0 release. No public exploit code or active exploitation has been reported yet. The vulnerability's impact is primarily on confidentiality and integrity through social engineering and redirection, with limited direct impact on availability. The vulnerability is typical of open redirect issues where insufficient validation of redirect targets allows attackers to abuse trusted domains to facilitate attacks.
Potential Impact
For European organizations using WeGIA, particularly educational or institutional bodies serving Portuguese-speaking populations, this vulnerability poses a moderate risk. Attackers can exploit the open redirect to conduct phishing attacks that leverage the trust users place in the legitimate WeGIA domain, increasing the likelihood of credential theft or malware infection. This can lead to unauthorized access to sensitive institutional data or compromise of user accounts. While the vulnerability does not directly allow system compromise or data manipulation, the indirect effects via social engineering can have significant operational and reputational impacts. Additionally, institutions that integrate WeGIA with other internal systems may face cascading risks if credentials or sessions are compromised. The medium CVSS score reflects that while exploitation is straightforward, the need for user interaction and the limited scope of direct technical impact reduce the overall severity. However, given the critical nature of institutional data and user trust, the threat should not be underestimated.
Mitigation Recommendations
European organizations should immediately upgrade WeGIA installations to version 3.5.0 or later to remediate the vulnerability. Where immediate patching is not feasible, organizations should implement strict input validation and URL filtering on the nextPage parameter at the web application firewall (WAF) or reverse proxy level to block redirects to untrusted external domains. Security teams should monitor logs for suspicious redirect attempts and educate users about the risks of clicking unexpected links, especially those purporting to come from WeGIA. Implementing multi-factor authentication (MFA) can reduce the impact of credential theft resulting from phishing. Additionally, organizations should conduct phishing awareness campaigns tailored to the user base to reduce the likelihood of successful social engineering. Regular vulnerability scanning and penetration testing focused on open redirect and similar web vulnerabilities should be incorporated into security programs. Finally, reviewing and restricting outbound web traffic to known malicious domains can help contain exploitation attempts.
Affected Countries
Portugal, Spain, France, Germany, United Kingdom, Italy
CVE-2025-62361: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to 3.5.0, an Open Redirect vulnerability was identified in the control.php endpoint of the WeGIA application, specifically in the nextPage parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This vulnerability is fixed in 3.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-62361 identifies an Open Redirect vulnerability (CWE-601) in the WeGIA web management system developed by LabRedesCefetRJ, targeting Portuguese language institutions. The vulnerability is located in the control.php endpoint, specifically within the nextPage parameter when used with the metodo=listarTodos and nomeClasse=AlmoxarifeControle parameters. Prior to version 3.5.0, this parameter does not properly validate or sanitize URLs, allowing an attacker to craft URLs that redirect users to arbitrary external domains. This redirection can be exploited to conduct phishing campaigns by luring users into malicious sites that mimic legitimate services, distribute malware payloads, or steal user credentials by impersonation. The vulnerability requires no privileges or authentication but depends on user interaction to click or be redirected via a crafted URL. The CVSS 4.8 score reflects a medium severity, considering the network attack vector, low attack complexity, no privileges required, but user interaction needed. The vulnerability affects all WeGIA versions prior to 3.5.0, and the vendor has addressed the issue in the 3.5.0 release. No public exploit code or active exploitation has been reported yet. The vulnerability's impact is primarily on confidentiality and integrity through social engineering and redirection, with limited direct impact on availability. The vulnerability is typical of open redirect issues where insufficient validation of redirect targets allows attackers to abuse trusted domains to facilitate attacks.
Potential Impact
For European organizations using WeGIA, particularly educational or institutional bodies serving Portuguese-speaking populations, this vulnerability poses a moderate risk. Attackers can exploit the open redirect to conduct phishing attacks that leverage the trust users place in the legitimate WeGIA domain, increasing the likelihood of credential theft or malware infection. This can lead to unauthorized access to sensitive institutional data or compromise of user accounts. While the vulnerability does not directly allow system compromise or data manipulation, the indirect effects via social engineering can have significant operational and reputational impacts. Additionally, institutions that integrate WeGIA with other internal systems may face cascading risks if credentials or sessions are compromised. The medium CVSS score reflects that while exploitation is straightforward, the need for user interaction and the limited scope of direct technical impact reduce the overall severity. However, given the critical nature of institutional data and user trust, the threat should not be underestimated.
Mitigation Recommendations
European organizations should immediately upgrade WeGIA installations to version 3.5.0 or later to remediate the vulnerability. Where immediate patching is not feasible, organizations should implement strict input validation and URL filtering on the nextPage parameter at the web application firewall (WAF) or reverse proxy level to block redirects to untrusted external domains. Security teams should monitor logs for suspicious redirect attempts and educate users about the risks of clicking unexpected links, especially those purporting to come from WeGIA. Implementing multi-factor authentication (MFA) can reduce the impact of credential theft resulting from phishing. Additionally, organizations should conduct phishing awareness campaigns tailored to the user base to reduce the likelihood of successful social engineering. Regular vulnerability scanning and penetration testing focused on open redirect and similar web vulnerabilities should be incorporated into security programs. Finally, reviewing and restricting outbound web traffic to known malicious domains can help contain exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-10T14:22:48.202Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ed702cefcc33289f469148
Added to database: 10/13/2025, 9:33:32 PM
Last enriched: 10/13/2025, 9:34:57 PM
Last updated: 10/16/2025, 6:45:02 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55089: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Eclipse Foundation FileX
CriticalCVE-2025-55084: CWE-126: Buffer Over-read in Eclipse Foundation NetX Duo
MediumCVE-2025-58778: Hidden functionality in Ruijie Networks Co., Ltd. RG-EST300
HighCVE-2025-0275: CWE-306 Missing Authentication for Critical Function in HCL Software BigFix Mobile
MediumCVE-2025-0274: CWE-306 Missing Authentication for Critical Function in HCL Software BigFix Modern Client Management
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.