GHSA-XGR2-5837-HF48
Vulnerability from github – Published: 2025-10-06 06:32 – Updated: 2025-10-07 13:42
VLAI?
Summary
NovoSGA: Manipulation of User Creation Page can lead to weak password requirements
Details
A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirmação da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "novosga/novosga"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.2.12"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-11322"
],
"database_specific": {
"cwe_ids": [
"CWE-521"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-07T13:42:48Z",
"nvd_published_at": "2025-10-06T06:15:35Z",
"severity": "LOW"
},
"details": "A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirma\u00e7\u00e3o da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"id": "GHSA-xgr2-5837-hf48",
"modified": "2025-10-07T13:42:48Z",
"published": "2025-10-06T06:32:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11322"
},
{
"type": "WEB",
"url": "https://github.com/marcelomulder/CVE/blob/main/NovoSga/CVE-2025-11322.md"
},
{
"type": "WEB",
"url": "https://github.com/marcelomulder/CVE/blob/main/NovoSga/Weak%20Password%20Policy%20in%20Novosga.md"
},
{
"type": "PACKAGE",
"url": "https://github.com/novosga/novosga"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.327203"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.327203"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.664517"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P",
"type": "CVSS_V4"
}
],
"summary": "NovoSGA: Manipulation of User Creation Page can lead to weak password requirements"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…