NovoSGA: Manipulation of User Creation Page can lead to weak password requirements
Low severity
GitHub Reviewed
Published
Oct 6, 2025
to the GitHub Advisory Database
•
Updated Oct 7, 2025
Description
Published by the National Vulnerability Database
Oct 6, 2025
Published to the GitHub Advisory Database
Oct 6, 2025
Reviewed
Oct 7, 2025
Last updated
Oct 7, 2025
A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirmação da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References