A vulnerability was found in LabRedesCefetRJ WeGIA 3.4.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /html/matPat/adicionar_tipoEntrada.php of the component Adicionar tipo. The manipulation of the argument Insira o novo tipo leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README5.md | Broken Link |
https://vuldb.com/?ctiid.313963 | Permissions Required VDB Entry |
https://vuldb.com/?id.313963 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.597386 | Exploit Third Party Advisory VDB Entry |
https://vuldb.com/?submit.597386 | Exploit Third Party Advisory VDB Entry |
Configurations
History
01 Jul 2025, 17:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README5.md - Broken Link | |
References | () https://vuldb.com/?ctiid.313963 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.313963 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.597386 - Exploit, Third Party Advisory, VDB Entry | |
First Time |
Wegia wegia
Wegia |
|
CPE | cpe:2.3:a:wegia:wegia:3.4.0:*:*:*:*:*:*:* | |
Summary |
|
26 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-26 15:15
Updated : 2025-07-01 17:57
NVD link : CVE-2025-6697
Mitre link : CVE-2025-6697
CVE.ORG link : CVE-2025-6697
JSON object : View
Products Affected
wegia
- wegia