CVE-2025-62361: Open Redirect Vulnerability in control.php endpoint nextPage parameter
CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-62361
Summary
An Open Redirect vulnerability was identified in the control.php endpoint of the WeGIA application, specifically in the nextPage parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle).This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft.
Details
The application fails to validate and sanitize user input in the nextPage parameter.As a result, attackers can craft malicious URLs that redirect users to external websites outside the trusted domain, undermining user trust and enabling social engineering attacks.
Vulnerable Endpoint: GET /WeGIA/controle/control.php?metodo=listarTodos&nomeClasse=AlmoxarifeControle&nextPage=
Parameter: nextPage
PoC
Request:
| |
The server accepts the crafted request and successfully redirects the victim to https://google.com instead of restricting navigation to the application’s own domain.
Impact
- Phishing: Attackers can trick users into visiting malicious sites that mimic legitimate ones.
- Credential theft: Fake login pages can capture user credentials.
- Malware distribution: Victims may be redirected to websites hosting malicious software.
- Reputation damage: Users may lose trust in the Wegia platform if abused in phishing campaigns.
Reference
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m99c-77f2-gpjx
Finder
By: CVE-Hunters

