Skip to main content

CVE-2025-54062: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA

Critical
VulnerabilityCVE-2025-54062cvecve-2025-54062cwe-89
Published: Thu Jul 17 2025 (07/17/2025, 14:33:27 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.4.6 in the `/html/funcionario/profile_dependente.php` endpoint, specifically in the `id_dependente` parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. Version 3.4.6 fixes the issue.

AI-Powered Analysis

AILast updated: 07/17/2025, 15:01:24 UTC

Technical Analysis

CVE-2025-54062 is a critical SQL Injection vulnerability affecting the WeGIA web management platform developed by LabRedesCefetRJ. WeGIA is an open-source web manager primarily targeting Portuguese-speaking charitable institutions. The vulnerability exists in versions prior to 3.4.6, specifically in the /html/funcionario/profile_dependente.php endpoint within the id_dependente parameter. Improper neutralization of special elements in this parameter allows an attacker to inject arbitrary SQL commands. This can lead to unauthorized data access, data modification, or deletion, thereby compromising the confidentiality, integrity, and availability of the backend database. The vulnerability requires no user interaction and can be exploited remotely over the network with low attack complexity and no privileges required, as indicated by the CVSS 4.0 vector AV:N/AC:L/PR:L/UI:N. The vulnerability affects a critical component of the application that manages dependent profiles, which likely contains sensitive personal and organizational data. Although no known exploits are currently reported in the wild, the high CVSS score of 9.4 reflects the severe potential impact. The issue is resolved in version 3.4.6 of WeGIA, which properly sanitizes the id_dependente parameter to prevent SQL Injection attacks.

Potential Impact

For European organizations, especially charitable institutions or NGOs using WeGIA or similar open-source management platforms, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive personal data of dependents and employees, violating GDPR and other data protection regulations. Data integrity could be compromised by unauthorized modification or deletion of records, disrupting organizational operations and trust. Availability of the service could also be impacted if attackers execute destructive SQL commands or cause database corruption. Given the focus on Portuguese language and charitable institutions, organizations in Portugal and other Portuguese-speaking communities in Europe are particularly at risk. The breach of sensitive data could lead to reputational damage, regulatory fines, and operational disruptions. Additionally, attackers could leverage the compromised database as a foothold for further network intrusion or lateral movement within the organization.

Mitigation Recommendations

European organizations using WeGIA should immediately verify their version and upgrade to version 3.4.6 or later to apply the official patch that addresses this SQL Injection vulnerability. Until the upgrade is applied, organizations should implement Web Application Firewall (WAF) rules to detect and block malicious SQL payloads targeting the id_dependente parameter. Input validation and parameterized queries should be enforced in any custom code or integrations interacting with WeGIA. Regular database backups should be maintained to enable recovery in case of data corruption or deletion. Organizations should also conduct security audits and penetration testing focused on injection flaws. Monitoring of application logs for suspicious query patterns and failed SQL commands can help detect attempted exploitation. Finally, organizations should review user privileges to ensure least privilege principles are applied, limiting the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T13:22:18.204Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68790cb4a83201eaace66ba4

Added to database: 7/17/2025, 2:46:12 PM

Last enriched: 7/17/2025, 3:01:24 PM

Last updated: 7/18/2025, 5:12:58 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats