CVE-2025-54061: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.4.6 in the `idatendido_familiares` parameter of the `/html/funcionario/dependente_editarDoc.php` endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data. Version 3.4.6 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-54061 is a critical SQL Injection vulnerability affecting the open-source web management software WeGIA, developed by LabRedesCefetRJ. WeGIA is primarily targeted at Portuguese-speaking charitable institutions, providing web-based management tools. The vulnerability exists in versions prior to 3.4.6 and is located in the 'idatendido_familiares' parameter of the '/html/funcionario/dependente_editarDoc.php' endpoint. This parameter is improperly sanitized, allowing an attacker to inject malicious SQL commands. Exploiting this flaw enables attackers to manipulate backend SQL queries, potentially extracting sensitive database information such as table names and confidential data stored within the system. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands. The CVSS 4.0 base score of 9.4 reflects its critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, with scope and security requirements also rated high. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make it a significant threat. Version 3.4.6 of WeGIA addresses and fixes this vulnerability, and users are strongly advised to upgrade to this or later versions to mitigate risk.
Potential Impact
For European organizations, especially those operating charitable or non-profit institutions using WeGIA, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of sensitive personal and organizational data, including donor information, beneficiary details, and internal records. This could result in privacy violations under GDPR, reputational damage, and potential legal liabilities. Furthermore, attackers could manipulate or corrupt database contents, impacting data integrity and operational continuity. Given the criticality and network accessibility of the vulnerability, attackers could remotely compromise systems without authentication or user interaction, increasing the risk of widespread exploitation. The impact extends beyond data theft to potential service disruption, undermining trust in affected organizations. European entities relying on WeGIA must prioritize remediation to prevent data breaches and maintain compliance with data protection regulations.
Mitigation Recommendations
Organizations should immediately upgrade WeGIA installations to version 3.4.6 or later, where the vulnerability is patched. Until the upgrade is applied, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'idatendido_familiares' parameter and the affected endpoint. Conduct thorough input validation and sanitization on all user-supplied data, employing parameterized queries or prepared statements if custom development is involved. Regularly audit and monitor database logs for suspicious query patterns indicative of injection attempts. Employ network segmentation to limit access to the WeGIA management interface to trusted internal networks or VPN users. Additionally, perform security awareness training for administrators managing WeGIA to recognize and respond to potential exploitation signs. Finally, maintain up-to-date backups of critical data to enable recovery in case of data integrity compromise.
Affected Countries
Portugal, Spain, France, Italy, Germany, Belgium, Netherlands
CVE-2025-54061: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.4.6 in the `idatendido_familiares` parameter of the `/html/funcionario/dependente_editarDoc.php` endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data. Version 3.4.6 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-54061 is a critical SQL Injection vulnerability affecting the open-source web management software WeGIA, developed by LabRedesCefetRJ. WeGIA is primarily targeted at Portuguese-speaking charitable institutions, providing web-based management tools. The vulnerability exists in versions prior to 3.4.6 and is located in the 'idatendido_familiares' parameter of the '/html/funcionario/dependente_editarDoc.php' endpoint. This parameter is improperly sanitized, allowing an attacker to inject malicious SQL commands. Exploiting this flaw enables attackers to manipulate backend SQL queries, potentially extracting sensitive database information such as table names and confidential data stored within the system. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands. The CVSS 4.0 base score of 9.4 reflects its critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, with scope and security requirements also rated high. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make it a significant threat. Version 3.4.6 of WeGIA addresses and fixes this vulnerability, and users are strongly advised to upgrade to this or later versions to mitigate risk.
Potential Impact
For European organizations, especially those operating charitable or non-profit institutions using WeGIA, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of sensitive personal and organizational data, including donor information, beneficiary details, and internal records. This could result in privacy violations under GDPR, reputational damage, and potential legal liabilities. Furthermore, attackers could manipulate or corrupt database contents, impacting data integrity and operational continuity. Given the criticality and network accessibility of the vulnerability, attackers could remotely compromise systems without authentication or user interaction, increasing the risk of widespread exploitation. The impact extends beyond data theft to potential service disruption, undermining trust in affected organizations. European entities relying on WeGIA must prioritize remediation to prevent data breaches and maintain compliance with data protection regulations.
Mitigation Recommendations
Organizations should immediately upgrade WeGIA installations to version 3.4.6 or later, where the vulnerability is patched. Until the upgrade is applied, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'idatendido_familiares' parameter and the affected endpoint. Conduct thorough input validation and sanitization on all user-supplied data, employing parameterized queries or prepared statements if custom development is involved. Regularly audit and monitor database logs for suspicious query patterns indicative of injection attempts. Employ network segmentation to limit access to the WeGIA management interface to trusted internal networks or VPN users. Additionally, perform security awareness training for administrators managing WeGIA to recognize and respond to potential exploitation signs. Finally, maintain up-to-date backups of critical data to enable recovery in case of data integrity compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T13:22:18.204Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68790cb4a83201eaace66baa
Added to database: 7/17/2025, 2:46:12 PM
Last enriched: 7/17/2025, 3:01:14 PM
Last updated: 7/18/2025, 5:12:46 AM
Views: 6
Related Threats
CVE-2025-7643: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aaroncampbell Attachment Manager
CriticalCVE-2025-6726: CWE-862 Missing Authorization in krasenslavov Block Editor Gallery Slider
MediumCVE-2025-6719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vladimirs Terms descriptions
MediumCVE-2025-6718: CWE-862 Missing Authorization in b1accounting B1.lt
HighCVE-2025-6717: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in b1accounting B1.lt
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.