Impact
The vulnerability in WeGIA arises from the unsafe use of PHP’s extract() function on the $_REQUEST superglobal. By supplying specially crafted query parameters, an attacker can overwrite internal variables, including those that control authentication flow, thereby bypassing login checks and gaining unrestricted administrative privileges. This flaw is classified as a high‑severity authentication bypass, with a CVSS base score of 9.8, and the associated weaknesses are identified as CWE‑288 and CWE‑473.
Affected Systems
Only the WeGIA web manager produced by LabRedesCefetRJ is affected. The flaw exists in all releases prior to version 3.6.5. Administrators running any of those earlier versions are exposed to the risk until they apply the vendor‑supplied fix.
Risk and Exploitability
The risk is significant: the flaw can be exploited by any internet‑connected user without authentication, given that the affected scripts are reachable via standard HTTP requests. Despite the very low EPSS probability (< 1 %) and absence from the CISA KEV catalog, the high CVSS score and complete loss of authentication make it a critical threat that requires urgent attention. An attacker can craft a request containing variables such as is_admin=1 to overwrite the session control logic and elevate privileges.
OpenCVE Enrichment