Skip to main content

CVE-2025-6699: Cross Site Scripting in LabRedesCefetRJ WeGIA

Medium
VulnerabilityCVE-2025-6699cvecve-2025-6699
Published: Thu Jun 26 2025 (06/26/2025, 15:31:12 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

A vulnerability classified as problematic has been found in LabRedesCefetRJ WeGIA 3.4.0. This affects an unknown part of the file /html/funcionario/cadastro_funcionario.php of the component Cadastro de Funcionário. The manipulation of the argument Nome/Sobrenome leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This is a different issue than CVE-2025-23030. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 06/26/2025, 16:05:15 UTC

Technical Analysis

CVE-2025-6699 is a cross-site scripting (XSS) vulnerability identified in version 3.4.0 of the LabRedesCefetRJ WeGIA software, specifically within the 'Cadastro de Funcionário' component located in the /html/funcionario/cadastro_funcionario.php file. The vulnerability arises due to improper sanitization or validation of user-supplied input in the 'Nome' and 'Sobrenome' parameters, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript in the context of the victim's browser without requiring authentication, although user interaction is necessary to trigger the payload (e.g., by visiting a crafted URL). The CVSS 4.0 base score is 5.1 (medium severity), reflecting that the attack vector is network-based with low attack complexity, no privileges required, but user interaction is needed. The vulnerability impacts confidentiality and integrity to a limited extent by potentially stealing session cookies, performing actions on behalf of the user, or defacing web content. The vendor was notified early but has not responded or issued a patch, and no known exploits have been observed in the wild yet. This vulnerability is distinct from CVE-2025-23030, indicating multiple security issues in the product. Given the public disclosure and lack of remediation, the risk of exploitation may increase over time.

Potential Impact

For European organizations using LabRedesCefetRJ WeGIA 3.4.0, this vulnerability poses a moderate risk primarily to web application users and administrators. Successful exploitation could lead to session hijacking, unauthorized actions performed under the victim's credentials, or distribution of malicious content, potentially undermining user trust and leading to data leakage or reputational damage. Although the vulnerability does not directly compromise backend systems or data integrity at a high level, it can serve as an entry point for social engineering or further attacks. Organizations in sectors with strict data protection regulations such as GDPR may face compliance risks if user data is exposed. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. The impact is more pronounced in environments where WeGIA is used for managing employee or personnel records, as attackers could leverage the XSS to manipulate or exfiltrate sensitive information indirectly.

Mitigation Recommendations

Since no official patch is available, European organizations should implement the following specific mitigations: 1) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'Nome' and 'Sobrenome' parameters in the affected URL path. 2) Conduct input validation and output encoding on the server side where possible, even if the vendor has not released a fix, by applying reverse proxies or middleware that sanitize inputs before reaching the application. 3) Educate users and administrators about the risks of clicking on suspicious links and implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4) Monitor web server logs for unusual requests or payload patterns targeting the vulnerable endpoint. 5) Isolate or restrict access to the affected application to trusted networks until a patch is available. 6) Engage with the vendor or community to track any forthcoming patches or updates. 7) Consider upgrading or migrating to alternative software solutions if feasible to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-26T08:11:42.259Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685d6c25ca1063fb87429338

Added to database: 6/26/2025, 3:49:57 PM

Last enriched: 6/26/2025, 4:05:15 PM

Last updated: 8/7/2025, 11:22:48 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats