Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62597: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA

0
Medium
VulnerabilityCVE-2025-62597cvecve-2025-62597cwe-79
Published: Tue Oct 21 2025 (10/21/2025, 16:34:19 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to version 3.5.1, a reflected cross-site scripting (XSS) vulnerability was identified in the editar_info_pessoal.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the sql parameter. The vulnerable endpoint is GET /WeGIA/html/pessoa/editar_info_pessoal.php?sql=1. This issue has been patched in version 3.5.1.

AI-Powered Analysis

AILast updated: 10/21/2025, 16:55:37 UTC

Technical Analysis

CVE-2025-62597 identifies a reflected cross-site scripting (XSS) vulnerability in the WeGIA application, an open-source web management system targeted primarily at Portuguese language institutions. The vulnerability exists in the editar_info_pessoal.php endpoint, where the 'sql' GET parameter is improperly sanitized, allowing attackers to inject malicious JavaScript code. This improper neutralization of input during web page generation corresponds to CWE-79. Since the vulnerability is reflected, the malicious payload is included in the URL and executed when a victim accesses the crafted link. The vulnerability does not require authentication, user interaction, or special privileges, increasing its exploitation potential. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability (VC:N/VI:N/VA:N), but with scope impact (S:I:L) due to potential session or context hijacking. The vulnerability was patched in WeGIA version 3.5.1, and no public exploits have been reported yet. The vulnerability's presence in a web management tool used by institutions makes it a significant risk for targeted phishing or social engineering attacks that leverage XSS to steal credentials or perform unauthorized actions within user sessions.

Potential Impact

For European organizations, especially those using WeGIA for institutional web management, this vulnerability poses a risk of client-side script execution leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. Given WeGIA's focus on Portuguese language users, institutions in Portugal and Portuguese-speaking communities in Europe are particularly at risk. The reflected XSS can be exploited via crafted URLs sent through phishing campaigns or malicious links, potentially compromising user accounts and sensitive institutional data. Although the vulnerability does not directly impact server confidentiality or availability, successful exploitation can lead to significant reputational damage, data breaches, and loss of user trust. The lack of authentication requirement increases the attack surface, making it easier for attackers to target a wide range of users. The medium CVSS score reflects moderate risk, but the potential for chained attacks or use in broader social engineering campaigns elevates its importance for European entities relying on WeGIA.

Mitigation Recommendations

European organizations using WeGIA should immediately upgrade to version 3.5.1 or later, where the vulnerability is patched. In addition to patching, organizations should implement strict input validation and output encoding on all user-supplied data, particularly URL parameters, to prevent XSS. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regularly audit web application endpoints for injection vulnerabilities using automated scanning tools tailored for XSS detection. Educate users and administrators about the risks of clicking on untrusted links and implement email filtering to reduce phishing attempts. Monitor web server logs for suspicious requests containing script tags or unusual URL parameters. If upgrading is delayed, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'sql' parameter in the vulnerable endpoint. Finally, maintain an incident response plan to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.267Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f7ba157853ccdda8797441

Added to database: 10/21/2025, 4:51:33 PM

Last enriched: 10/21/2025, 4:55:37 PM

Last updated: 10/23/2025, 8:11:46 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats