Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. novosga/novosga
  4. ›
  5. CVE-2025-11322

CVE-2025-11322: NovoSGA: Manipulation of User Creation Page can lead to weak password requirements

October 6, 2025 (updated October 7, 2025)

A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirmação da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

  • github.com/advisories/GHSA-xgr2-5837-hf48
  • github.com/marcelomulder/CVE/blob/main/NovoSga/CVE-2025-11322.md
  • github.com/marcelomulder/CVE/blob/main/NovoSga/Weak%20Password%20Policy%20in%20Novosga.md
  • github.com/novosga/novosga
  • nvd.nist.gov/vuln/detail/CVE-2025-11322
  • vuldb.com/?ctiid.327203
  • vuldb.com/?id.327203
  • vuldb.com/?submit.664517

Code Behaviors & Features

Detect and mitigate CVE-2025-11322 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.2.12

Solution

Unfortunately, there is no solution available yet.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-521: Weak Password Requirements

Source file

packagist/novosga/novosga/CVE-2025-11322.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 09 Nov 2025 12:19:55 +0000.