CVE-2025-53821

4.7 MEDIUM

📋 TL;DR

This CVE describes an Open Redirect vulnerability in WeGIA web management software where attackers can manipulate the 'nextPage' parameter in control.php to redirect users to malicious websites. All WeGIA instances prior to version 3.4.5 are affected, particularly charitable institutions using this Portuguese-language platform.

💻 Affected Systems

Products:
  • WeGIA
Versions: All versions prior to 3.4.5
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WeGIA web applications with the vulnerable control.php endpoint accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect users to phishing sites that steal credentials or deliver malware, potentially compromising organizational accounts and systems.

🟠

Likely Case

Users could be tricked into visiting malicious sites through legitimate-looking redirects, leading to credential theft or malware infections.

🟢

If Mitigated

With proper user awareness training and web filtering, the impact is limited to failed phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Open redirect vulnerabilities are commonly exploited in phishing campaigns and require minimal technical skill to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.5

Vendor Advisory: https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-f5c2-jmm6-v2c5

Restart Required: Yes

Instructions:

1. Backup your current WeGIA installation and database. 2. Download version 3.4.5 from the official repository. 3. Replace the existing files with the patched version. 4. Restart the web server service.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or sanitize requests containing external URLs in the nextPage parameter

WAF-specific configuration required

URL Validation Middleware

all

Implement server-side validation to only allow relative URLs or trusted domains in redirects

Custom code implementation required

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict redirect destinations
  • Deploy network/web filtering to block known malicious domains and suspicious redirect patterns

🔍 How to Verify

Check if Vulnerable:

Test by accessing control.php with a nextPage parameter containing an external URL (e.g., control.php?nextPage=https://evil.com) and check if redirect occurs

Check Version:

Check WeGIA version in admin panel or review source code for version markers

Verify Fix Applied:

After patching, repeat the vulnerable test and confirm redirects are blocked or sanitized

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to control.php with external URLs in parameters
  • Unusual redirect patterns in access logs

Network Indicators:

  • Redirects to unexpected external domains from WeGIA application

SIEM Query:

source="web_logs" AND uri="/control.php" AND query="*nextPage=http*"

🔗 References

📤 Share & Export