Featured image of post CVE-2025-22615

CVE-2025-22615

Cross-Site Scripting (XSS) Reflected

CVE-2025-22615: Cross-Site Scripting (XSS) Reflected endpoint Cadastro_Atendido.php parameter cpf

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-22615

Summary

A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the Cadastro_Atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the cpf parameter.

Details

Vulnerable Endpoint: GET /html/atendido/Cadastro_Atendido.php

Parameter: cpf

The application fails to validate and sanitize user inputs in the cpf parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser.

POC

Payload:

1
  "><script>alert(document.cookie)</script>

Impact

Reflected cross-site scripting (XSS) attacks can have serious consequences, including:

  • User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.
  • Data theft: Attackers can exfiltrate data or install malware on the user's machine.
  • Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.
  • Malicious code: Attackers can execute malicious code on the user's system.
  • Business reputation damage: Attackers can deface a corporate website or spread misinformation.
  • Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.

Reference

https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6q73-74pc-p3c8

Finder

Elisangela Mendonça

Contributors

Angelo Morette

Diego Castrocode

Natan Maia Morette

Rafael Corvino

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy