Skip to main content

CVE-2025-54079: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA

Critical
VulnerabilityCVE-2025-54079cvecve-2025-54079cwe-89
Published: Fri Jul 18 2025 (07/18/2025, 15:56:58 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.4.6 in the endpoint `/html/atendido/Profile_Atendido.php`, in the `idatendido` parameter. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.4.6 fixes the issue.

AI-Powered Analysis

AILast updated: 07/18/2025, 16:16:44 UTC

Technical Analysis

CVE-2025-54079 is a critical SQL Injection vulnerability identified in the open-source web management software WeGIA, developed by LabRedesCefetRJ. WeGIA is designed primarily for Portuguese-speaking charitable institutions, providing web-based management functionalities. The vulnerability exists in versions prior to 3.4.6 within the endpoint `/html/atendido/Profile_Atendido.php`, specifically in the `idatendido` parameter. This parameter is improperly sanitized, allowing an authorized attacker to inject malicious SQL commands. Exploitation of this flaw enables attackers to execute arbitrary SQL queries on the backend database, potentially leading to unauthorized access to sensitive information, data manipulation, or disruption of service. The CVSS 4.0 base score of 9.4 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no required user interaction, and the fact that only low privileges are needed to exploit it. The vulnerability impacts confidentiality, integrity, and availability at a high level, with a wide scope affecting all instances of WeGIA versions below 3.4.6. The issue has been addressed in version 3.4.6, which includes proper input validation and sanitization to neutralize special SQL elements in the `idatendido` parameter, mitigating the risk of injection attacks. No known exploits are reported in the wild as of the publication date, but the critical severity and ease of exploitation make it a high-priority patch for affected users.

Potential Impact

For European organizations using WeGIA, particularly charitable institutions or NGOs operating in Portuguese or serving Portuguese-speaking communities, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive personal or organizational data, undermining privacy compliance obligations such as GDPR. Data integrity could be compromised, potentially affecting operational reliability and trustworthiness of the institution. Availability impacts could arise if attackers execute destructive SQL commands, leading to service outages or data loss. Given the critical CVSS score and the low privileges required for exploitation, attackers could leverage this vulnerability to escalate access or pivot within the network. The impact is especially concerning for organizations handling donor information, beneficiary data, or financial records, where confidentiality and integrity are paramount.

Mitigation Recommendations

Organizations should immediately upgrade all WeGIA instances to version 3.4.6 or later to apply the official patch that fixes the SQL Injection vulnerability. Until the upgrade is completed, it is advisable to implement Web Application Firewall (WAF) rules specifically targeting SQL Injection patterns on the vulnerable endpoint and parameter (`idatendido`). Conduct thorough input validation and sanitization at the application level as an additional safeguard. Restrict access to the vulnerable endpoint to authorized users only and monitor logs for suspicious query patterns indicative of injection attempts. Regularly audit database permissions to ensure least privilege principles are enforced, limiting the potential damage from any successful injection. Additionally, organizations should perform vulnerability scanning and penetration testing focused on SQL Injection to verify the effectiveness of mitigations and detect any residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T13:22:18.206Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687a6fc6a83201eaacf4f8a3

Added to database: 7/18/2025, 4:01:10 PM

Last enriched: 7/18/2025, 4:16:44 PM

Last updated: 8/30/2025, 6:23:01 PM

Views: 37

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats