CVE-2025-11322
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-06

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/ConfirmaΓ§Γ£o da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-06
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mangati novosga 2.2.12
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-521 The product does not require that users should have strong passwords.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Mangati NovoSGA up to version 2.2.12 allows attackers to create user accounts with weak passwords due to insufficient enforcement of strong password requirements in the User Creation Page (/novosga.users/new). Specifically, manipulation of the password fields ('Senha' and 'ConfirmaΓ§Γ£o da senha') enables setting weak and predictable passwords like '123456'. This flaw can be exploited remotely without authentication, although the attack is considered complex and difficult. The vulnerability increases the risk of unauthorized access and compromises the security of the platform. [1, 2]


How can this vulnerability impact me? :

The vulnerability can lead to several security impacts including increased risk of brute-force and credential stuffing attacks, potential unauthorized access to user or administrative accounts, possible privilege escalation through compromised accounts, and overall degradation of the application's security posture. Since weak passwords can be used, attackers may gain access to sensitive information or control over the system. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for the creation of user accounts with weak passwords, especially those matching common weak passwords like "123456". Since the vulnerability affects the /novosga.users/new endpoint, you can inspect web server logs or use network monitoring tools to detect POST requests to this endpoint that include weak password values in the 'Senha' or 'ConfirmaΓ§Γ£o da senha' fields. Commands to check logs might include searching for such requests with tools like grep, for example: grep -i 'POST /novosga.users/new' /var/log/apache2/access.log | grep -E '123456|password|qwerty'. Additionally, scanning for accounts with weak passwords in the system database or user management interface can help detect exploitation. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include enforcing strong password policies requiring minimum length and a mix of uppercase, lowercase, digits, and special characters; blocking commonly known weak passwords using blocklists (e.g., "123456", "password", "qwerty"); encouraging or enforcing multi-factor authentication (MFA); and implementing rate-limiting or account lockout mechanisms to hinder brute-force attempts. Since no patches or vendor fixes are available, consider applying external controls or using alternative products to reduce risk. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart