CVE-2025-61665

7.5 HIGH

📋 TL;DR

CVE-2025-61665 is a broken access control vulnerability in WeGIA, an open-source web manager for charitable institutions. Unauthenticated attackers can directly access the get_relatorios_socios.php endpoint to retrieve sensitive personal and financial information of members without any authentication. This affects all deployments running WeGIA versions 3.4.12 and below.

💻 Affected Systems

Products:
  • WeGIA
Versions: 3.4.12 and below
Operating Systems: Any OS running WeGIA
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the get_relatorios_socios.php endpoint which lacks proper access controls.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass data breach exposing all member personal information (names, addresses, contact details) and financial data, potentially leading to identity theft, financial fraud, and regulatory penalties.

🟠

Likely Case

Unauthenticated attackers harvesting sensitive member data for malicious purposes, compromising privacy and potentially enabling targeted attacks against individuals.

🟢

If Mitigated

No data exposure if proper authentication and authorization controls are implemented at the endpoint level.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only direct HTTP requests to the vulnerable endpoint without any authentication. The advisory provides details about the vulnerable code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.0

Vendor Advisory: https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-62wp-6qmh-6p5f

Restart Required: Yes

Instructions:

1. Backup current WeGIA installation and database. 2. Download WeGIA version 3.5.0 from the official repository. 3. Replace existing files with new version files. 4. Run any database migration scripts if provided. 5. Restart web server services.

🔧 Temporary Workarounds

Block direct access to vulnerable endpoint

all

Configure web server to block or restrict access to get_relatorios_socios.php endpoint

# For Apache: Add to .htaccess
<Files "get_relatorios_socios.php">
    Order Deny,Allow
    Deny from all
</Files>
# For Nginx: Add to server block
location ~ /get_relatorios_socios\.php$ {
    deny all;
    return 403;
}

Implement authentication middleware

all

Add authentication check at the beginning of get_relatorios_socios.php file

<?php
// Add at top of get_relatorios_socios.php
session_start();
if (!isset($_SESSION['authenticated']) || $_SESSION['authenticated'] !== true) {
    http_response_code(403);
    exit('Access denied');
}
?>

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to WeGIA application to authorized users only
  • Deploy a web application firewall (WAF) with rules to block unauthenticated access to sensitive endpoints

🔍 How to Verify

Check if Vulnerable:

Attempt to access /get_relatorios_socios.php endpoint without authentication. If it returns member data, the system is vulnerable.

Check Version:

Check WeGIA version in admin panel or examine version.php file in installation directory

Verify Fix Applied:

After patching, attempt to access /get_relatorios_socios.php endpoint without authentication. It should return an authentication error or 403 Forbidden.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to /get_relatorios_socios.php from unauthenticated IPs
  • Unusual access patterns to member data endpoints

Network Indicators:

  • HTTP GET requests to /get_relatorios_socios.php without preceding authentication requests
  • Large data transfers from WeGIA server to unfamiliar IPs

SIEM Query:

source="wegia_access.log" AND uri="/get_relatorios_socios.php" AND NOT (user_agent="*bot*" OR user_agent="*crawler*") | stats count by src_ip

🔗 References

📤 Share & Export