WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a path traversal vulnerability was discovered in the WeGIA application, html/socio/sistema/download_remessa.php endpoint. This vulnerability could allow an attacker to gain unauthorized access to local files in the server and sensitive information stored in config.php. config.php contains information that could allow direct access to the database. This issue has been patched in version 3.4.8.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a path traversal vulnerability was discovered in the WeGIA application, html/socio/sistema/download_remessa.php endpoint. This vulnerability could allow an attacker to gain unauthorized access to local files in the server and sensitive information stored in config.php. config.php contains information that could allow direct access to the database. This issue has been patched in version 3.4.8. | |
Title | WeGIA Path Traversal at endpoint 'html/socio/sistema/download_remessa.php' via parameter 'file' | |
Weaknesses | CWE-22 CWE-287 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-12T19:01:40.482Z
Updated: 2025-08-12T19:24:39.679Z
Reserved: 2025-08-07T18:27:23.307Z
Link: CVE-2025-55169

Updated: 2025-08-12T19:23:27.855Z

Status : Analyzed
Published: 2025-08-12T19:15:36.430
Modified: 2025-08-14T01:30:59.277
Link: CVE-2025-55169

No data.