CVE-2025-55169
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-12

Last updated on: 2025-08-14

Assigner: GitHub, Inc.

Description
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a path traversal vulnerability was discovered in the WeGIA application, html/socio/sistema/download_remessa.php endpoint. This vulnerability could allow an attacker to gain unauthorized access to local files in the server and sensitive information stored in config.php. config.php contains information that could allow direct access to the database. This issue has been patched in version 3.4.8.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-12
Last Modified
2025-08-14
Generated
2026-05-07
AI Q&A
2025-08-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wegia wegia to 3.4.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a path traversal issue in the WeGIA web manager application prior to version 3.4.8. It occurs in the html/socio/sistema/download_remessa.php endpoint and allows an attacker to access local files on the server without authorization. Specifically, an attacker could access sensitive files like config.php, which contains database access information.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to gain unauthorized access to sensitive files on the server, such as config.php, which contains database credentials. This could lead to further compromise of the database and potentially the entire system, resulting in data breaches and loss of confidentiality.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability could lead to unauthorized access to sensitive data, which may result in non-compliance with data protection regulations such as GDPR and HIPAA. Exposure of confidential information could trigger legal and regulatory consequences due to failure to protect personal or sensitive data.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the WeGIA application to version 3.4.8 or later, as this version contains the patch that fixes the path traversal vulnerability in the html/socio/sistema/download_remessa.php endpoint.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart