First published: Tue Feb 18 2025(Updated: )
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application, `exportar_dump.php` endpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive information stored in `config.php`. `config.php` contains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wegia Wegia | <3.2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26616 has been classified as a medium severity vulnerability due to the potential for unauthorized access to sensitive information.
To address CVE-2025-26616, update WeGIA to version 3.2.15 or later where the vulnerability has been patched.
CVE-2025-26616 is a Path Traversal vulnerability that affects the exportar_dump.php endpoint in the WeGIA application.
CVE-2025-26616 affects users of WeGIA versions up to 3.2.14.
An attacker exploiting CVE-2025-26616 could gain unauthorized access to sensitive information on the WeGIA application.