First published: Fri Jan 17 2025(Updated: )
WeGIA < 3.2.0 is vulnerable to Incorrect Access Control in controle/control.php. The application does not validate the value of the old password, so it is possible to change the password by placing any value in the senha_antiga field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wegia Wegia | <3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57032 has a critical severity level due to the improper access control allowing unauthorized password changes.
To fix CVE-2024-57032, upgrade WeGIA to version 3.2.0 or later where this vulnerability is addressed.
CVE-2024-57032 affects WeGIA versions prior to 3.2.0, specifically the controle/control.php component.
CVE-2024-57032 is categorized as an Incorrect Access Control vulnerability.
Yes, CVE-2024-57032 can potentially lead to account takeovers by allowing unauthorized users to change passwords.