CVE-2025-11322: NovoSGA: Manipulation of User Creation Page can lead to weak password requirements
(updated )
A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirmação da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
- github.com/advisories/GHSA-xgr2-5837-hf48
- github.com/marcelomulder/CVE/blob/main/NovoSga/CVE-2025-11322.md
- github.com/marcelomulder/CVE/blob/main/NovoSga/Weak%20Password%20Policy%20in%20Novosga.md
- github.com/novosga/novosga
- nvd.nist.gov/vuln/detail/CVE-2025-11322
- vuldb.com/?ctiid.327203
- vuldb.com/?id.327203
- vuldb.com/?submit.664517
Code Behaviors & Features
Detect and mitigate CVE-2025-11322 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →