CVE-2025-54079: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.4.6 in the endpoint `/html/atendido/Profile_Atendido.php`, in the `idatendido` parameter. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.4.6 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-54079 is a critical SQL Injection vulnerability identified in the open-source web management software WeGIA, developed by LabRedesCefetRJ. WeGIA is designed primarily for Portuguese-speaking charitable institutions, providing web-based management functionalities. The vulnerability exists in versions prior to 3.4.6 within the endpoint `/html/atendido/Profile_Atendido.php`, specifically in the `idatendido` parameter. This parameter is improperly sanitized, allowing an authorized attacker to inject malicious SQL commands. Exploitation of this flaw enables attackers to execute arbitrary SQL queries on the backend database, potentially leading to unauthorized access to sensitive information, data manipulation, or disruption of service. The CVSS 4.0 base score of 9.4 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no required user interaction, and the fact that only low privileges are needed to exploit it. The vulnerability impacts confidentiality, integrity, and availability at a high level, with a wide scope affecting all instances of WeGIA versions below 3.4.6. The issue has been addressed in version 3.4.6, which includes proper input validation and sanitization to neutralize special SQL elements in the `idatendido` parameter, mitigating the risk of injection attacks. No known exploits are reported in the wild as of the publication date, but the critical severity and ease of exploitation make it a high-priority patch for affected users.
Potential Impact
For European organizations using WeGIA, particularly charitable institutions or NGOs operating in Portuguese or serving Portuguese-speaking communities, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive personal or organizational data, undermining privacy compliance obligations such as GDPR. Data integrity could be compromised, potentially affecting operational reliability and trustworthiness of the institution. Availability impacts could arise if attackers execute destructive SQL commands, leading to service outages or data loss. Given the critical CVSS score and the low privileges required for exploitation, attackers could leverage this vulnerability to escalate access or pivot within the network. The impact is especially concerning for organizations handling donor information, beneficiary data, or financial records, where confidentiality and integrity are paramount.
Mitigation Recommendations
Organizations should immediately upgrade all WeGIA instances to version 3.4.6 or later to apply the official patch that fixes the SQL Injection vulnerability. Until the upgrade is completed, it is advisable to implement Web Application Firewall (WAF) rules specifically targeting SQL Injection patterns on the vulnerable endpoint and parameter (`idatendido`). Conduct thorough input validation and sanitization at the application level as an additional safeguard. Restrict access to the vulnerable endpoint to authorized users only and monitor logs for suspicious query patterns indicative of injection attempts. Regularly audit database permissions to ensure least privilege principles are enforced, limiting the potential damage from any successful injection. Additionally, organizations should perform vulnerability scanning and penetration testing focused on SQL Injection to verify the effectiveness of mitigations and detect any residual risks.
Affected Countries
Portugal, Spain, France, Germany, United Kingdom, Italy, Belgium, Netherlands
CVE-2025-54079: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.4.6 in the endpoint `/html/atendido/Profile_Atendido.php`, in the `idatendido` parameter. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.4.6 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-54079 is a critical SQL Injection vulnerability identified in the open-source web management software WeGIA, developed by LabRedesCefetRJ. WeGIA is designed primarily for Portuguese-speaking charitable institutions, providing web-based management functionalities. The vulnerability exists in versions prior to 3.4.6 within the endpoint `/html/atendido/Profile_Atendido.php`, specifically in the `idatendido` parameter. This parameter is improperly sanitized, allowing an authorized attacker to inject malicious SQL commands. Exploitation of this flaw enables attackers to execute arbitrary SQL queries on the backend database, potentially leading to unauthorized access to sensitive information, data manipulation, or disruption of service. The CVSS 4.0 base score of 9.4 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no required user interaction, and the fact that only low privileges are needed to exploit it. The vulnerability impacts confidentiality, integrity, and availability at a high level, with a wide scope affecting all instances of WeGIA versions below 3.4.6. The issue has been addressed in version 3.4.6, which includes proper input validation and sanitization to neutralize special SQL elements in the `idatendido` parameter, mitigating the risk of injection attacks. No known exploits are reported in the wild as of the publication date, but the critical severity and ease of exploitation make it a high-priority patch for affected users.
Potential Impact
For European organizations using WeGIA, particularly charitable institutions or NGOs operating in Portuguese or serving Portuguese-speaking communities, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive personal or organizational data, undermining privacy compliance obligations such as GDPR. Data integrity could be compromised, potentially affecting operational reliability and trustworthiness of the institution. Availability impacts could arise if attackers execute destructive SQL commands, leading to service outages or data loss. Given the critical CVSS score and the low privileges required for exploitation, attackers could leverage this vulnerability to escalate access or pivot within the network. The impact is especially concerning for organizations handling donor information, beneficiary data, or financial records, where confidentiality and integrity are paramount.
Mitigation Recommendations
Organizations should immediately upgrade all WeGIA instances to version 3.4.6 or later to apply the official patch that fixes the SQL Injection vulnerability. Until the upgrade is completed, it is advisable to implement Web Application Firewall (WAF) rules specifically targeting SQL Injection patterns on the vulnerable endpoint and parameter (`idatendido`). Conduct thorough input validation and sanitization at the application level as an additional safeguard. Restrict access to the vulnerable endpoint to authorized users only and monitor logs for suspicious query patterns indicative of injection attempts. Regularly audit database permissions to ensure least privilege principles are enforced, limiting the potential damage from any successful injection. Additionally, organizations should perform vulnerability scanning and penetration testing focused on SQL Injection to verify the effectiveness of mitigations and detect any residual risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T13:22:18.206Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687a6fc6a83201eaacf4f8a3
Added to database: 7/18/2025, 4:01:10 PM
Last enriched: 7/18/2025, 4:16:44 PM
Last updated: 8/30/2025, 6:23:01 PM
Views: 37
Related Threats
CVE-2025-9802: SQL Injection in RemoteClinic
MediumCVE-2025-9801: Path Traversal in SimStudioAI sim
MediumCVE-2025-9800: Unrestricted Upload in SimStudioAI sim
MediumCVE-2025-9799: Server-Side Request Forgery in Langfuse
LowCVE-2025-9797: Injection in mrvautin expressCart
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.