Cyber Posture

CVE-2025-26616

HighPublic PoC

Published: 18 February 2025

Published
18 February 2025
Modified
28 February 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0072 72.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26616 is a high-severity Path Traversal (CWE-22) vulnerability in Wegia Wegia. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 27.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates path traversal by validating and sanitizing user-supplied path inputs to the exportar_dump.php endpoint, preventing access to unauthorized files like config.php.

prevent

Remediates the specific path traversal flaw through timely patching, such as upgrading WeGIA to version 3.2.14 where the issue is fixed.

prevent

Enforces approved access authorizations to information and system resources, blocking unauthorized reads of sensitive config.php containing database credentials.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Path traversal in public-facing web app directly enables T1190 for remote unauthenticated exploitation; exposure of database credentials in config.php facilitates T1552.001 for unsecured credential access from files.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application, `exportar_dump.php` endpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive…

more

information stored in `config.php`. `config.php` contains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Deeper analysisAI

CVE-2025-26616 is a path traversal vulnerability in the WeGIA open-source web manager application, primarily targeted at Portuguese-language institutional users. The flaw resides in the `exportar_dump.php` endpoint, which allows attackers to traverse directories and access sensitive files outside the intended path. Specifically, it enables unauthorized retrieval of `config.php`, a configuration file containing database credentials and other sensitive information that could facilitate direct database access. The vulnerability is associated with CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-284 (Improper Access Control), earning a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting malicious requests to the `exportar_dump.php` endpoint, they can read the contents of `config.php`, exposing database connection details. This confidentiality impact could enable subsequent attacks, such as unauthorized data extraction or manipulation from the underlying database, depending on the exposed credentials' privileges.

The GitHub Security Advisory (GHSA-xxqg-p22h-3f32) confirms the issue has been patched in WeGIA version 3.2.14, urging all users to upgrade immediately. No workarounds are available.

Details

CWE(s)

Affected Products

wegia
wegia
≤ 3.2.14

CVEs Like This One

CVE-2025-26615Same product: Wegia Wegia
CVE-2025-26609Same product: Wegia Wegia
CVE-2025-26617Same product: Wegia Wegia
CVE-2025-26607Same product: Wegia Wegia
CVE-2025-26608Same product: Wegia Wegia
CVE-2025-26613Same product: Wegia Wegia
CVE-2025-26611Same product: Wegia Wegia
CVE-2024-57032Same product: Wegia Wegia
CVE-2025-26606Same product: Wegia Wegia
CVE-2025-27140Same product: Wegia Wegia

References