{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6697","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-26T08:11:36.784Z","datePublished":"2025-06-26T15:00:12.058Z","dateUpdated":"2025-06-26T15:20:10.420Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-26T15:00:12.058Z"},"title":"LabRedesCefetRJ WeGIA Adicionar tipo adicionar_tipoEntrada.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"LabRedesCefetRJ","product":"WeGIA","versions":[{"version":"3.4.0","status":"affected"}],"modules":["Adicionar tipo"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in LabRedesCefetRJ WeGIA 3.4.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /html/matPat/adicionar_tipoEntrada.php of the component Adicionar tipo. The manipulation of the argument Insira o novo tipo leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In LabRedesCefetRJ WeGIA 3.4.0 wurde eine problematische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /html/matPat/adicionar_tipoEntrada.php der Komponente Adicionar tipo. Dank Manipulation des Arguments Insira o novo tipo mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-06-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-26T10:16:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"RaulPACXXX (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.313963","name":"VDB-313963 | LabRedesCefetRJ WeGIA Adicionar tipo adicionar_tipoEntrada.php cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.313963","name":"VDB-313963 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.597386","name":"Submit #597386 | WeGIA WeGIA Web Gerenciador  3.4.0 Stored Cross Site Scripting","tags":["third-party-advisory"]},{"url":"https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README5.md","tags":["broken-link","exploit"]}]},"adp":[{"references":[{"url":"https://vuldb.com/?submit.597386","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-26T15:20:07.863479Z","id":"CVE-2025-6697","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-26T15:20:10.420Z"}}]}}