Skip to main content

CVE-2025-54061: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA

Critical
VulnerabilityCVE-2025-54061cvecve-2025-54061cwe-89
Published: Thu Jul 17 2025 (07/17/2025, 14:30:21 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.4.6 in the `idatendido_familiares` parameter of the `/html/funcionario/dependente_editarDoc.php` endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data. Version 3.4.6 fixes the issue.

AI-Powered Analysis

AILast updated: 07/17/2025, 15:01:14 UTC

Technical Analysis

CVE-2025-54061 is a critical SQL Injection vulnerability affecting the open-source web management software WeGIA, developed by LabRedesCefetRJ. WeGIA is primarily targeted at Portuguese-speaking charitable institutions, providing web-based management tools. The vulnerability exists in versions prior to 3.4.6 and is located in the 'idatendido_familiares' parameter of the '/html/funcionario/dependente_editarDoc.php' endpoint. This parameter is improperly sanitized, allowing an attacker to inject malicious SQL commands. Exploiting this flaw enables attackers to manipulate backend SQL queries, potentially extracting sensitive database information such as table names and confidential data stored within the system. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands. The CVSS 4.0 base score of 9.4 reflects its critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, with scope and security requirements also rated high. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make it a significant threat. Version 3.4.6 of WeGIA addresses and fixes this vulnerability, and users are strongly advised to upgrade to this or later versions to mitigate risk.

Potential Impact

For European organizations, especially those operating charitable or non-profit institutions using WeGIA, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of sensitive personal and organizational data, including donor information, beneficiary details, and internal records. This could result in privacy violations under GDPR, reputational damage, and potential legal liabilities. Furthermore, attackers could manipulate or corrupt database contents, impacting data integrity and operational continuity. Given the criticality and network accessibility of the vulnerability, attackers could remotely compromise systems without authentication or user interaction, increasing the risk of widespread exploitation. The impact extends beyond data theft to potential service disruption, undermining trust in affected organizations. European entities relying on WeGIA must prioritize remediation to prevent data breaches and maintain compliance with data protection regulations.

Mitigation Recommendations

Organizations should immediately upgrade WeGIA installations to version 3.4.6 or later, where the vulnerability is patched. Until the upgrade is applied, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'idatendido_familiares' parameter and the affected endpoint. Conduct thorough input validation and sanitization on all user-supplied data, employing parameterized queries or prepared statements if custom development is involved. Regularly audit and monitor database logs for suspicious query patterns indicative of injection attempts. Employ network segmentation to limit access to the WeGIA management interface to trusted internal networks or VPN users. Additionally, perform security awareness training for administrators managing WeGIA to recognize and respond to potential exploitation signs. Finally, maintain up-to-date backups of critical data to enable recovery in case of data integrity compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T13:22:18.204Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68790cb4a83201eaace66baa

Added to database: 7/17/2025, 2:46:12 PM

Last enriched: 7/17/2025, 3:01:14 PM

Last updated: 7/18/2025, 5:12:46 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats