WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. An Authentication Bypass vulnerability was identified in the `/dao/verificar_recursos_cargo.php` endpoint of the WeGIA application prior to version 3.4.5. This vulnerability allows unauthenticated users to access protected application functionalities and retrieve sensitive information by sending crafted HTTP requests without any session cookies or authentication tokens. Version 3.4.5 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Sat, 19 Jul 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. An Authentication Bypass vulnerability was identified in the `/dao/verificar_recursos_cargo.php` endpoint of the WeGIA application prior to version 3.4.5. This vulnerability allows unauthenticated users to access protected application functionalities and retrieve sensitive information by sending crafted HTTP requests without any session cookies or authentication tokens. Version 3.4.5 fixes the issue. | |
Title | WeGIA vulnerable to Authentication Bypass due to Missing Session Validation in multiple endpoints | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-16T16:04:51.218Z
Updated: 2025-07-18T14:35:03.618Z
Reserved: 2025-07-14T17:23:35.261Z
Link: CVE-2025-53938

Updated: 2025-07-18T14:34:51.414Z

Status : Awaiting Analysis
Published: 2025-07-16T16:15:29.273
Modified: 2025-07-18T15:15:29.657
Link: CVE-2025-53938

No data.