Path Traversal Vulnerability in WeGIA Web Manager for Portuguese Language Users
CVE-2025-26615
7.5HIGH
Summary
A path traversal vulnerability was identified in the WeGIA application at the examples.php
endpoint. This flaw could enable an attacker to access sensitive data stored in the config.php
file, which contains critical database connection information. Exploiting this vulnerability poses significant risks as attackers could potentially gain unauthorized access to the database. Users are strongly encouraged to update to version 3.2.14, which addresses this issue, as there are no known workarounds available.
Affected Version(s)
WeGIA < 3.2.14
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved