First published: Tue Feb 18 2025(Updated: )
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application, `examples.php` endpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive information stored in `config.php`. `config.php` contains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wegia Wegia | <3.2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26615 has been classified with a medium severity due to its Path Traversal nature which can lead to unauthorized access.
To fix CVE-2025-26615, update WeGIA to version 3.2.15 or later, where the vulnerability has been addressed.
CVE-2025-26615 affects WeGIA versions up to and including 3.2.14.
CVE-2025-26615 is a Path Traversal vulnerability that may allow unauthorized access to sensitive information.
Yes, CVE-2025-26615 can potentially be exploited remotely if the attacker knows the affected endpoint.