Low severity3.7GHSA Advisory· Published Oct 6, 2025· Updated Apr 29, 2026
CVE-2025-11322
CVE-2025-11322
Description
A flaw has been found in Mangati NovoSGA up to 2.2.12. The impacted element is an unknown function of the file /novosga.users/new of the component User Creation Page. Executing manipulation of the argument Senha/Confirmação da senha can lead to weak password requirements. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is regarded as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
novosga/novosgaPackagist | <= 2.2.12 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-xgr2-5837-hf48ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-11322ghsaADVISORY
- github.com/marcelomulder/CVE/blob/main/NovoSga/CVE-2025-11322.mdnvdWEB
- github.com/marcelomulder/CVE/blob/main/NovoSga/Weak%20Password%20Policy%20in%20Novosga.mdnvdWEB
- vuldb.comnvdWEB
- vuldb.comnvdWEB
- vuldb.comnvdWEB
News mentions
0No linked articles in our index yet.