Skip to main content

CVE-2025-57761: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA

Critical
VulnerabilityCVE-2025-57761cvecve-2025-57761cwe-89
Published: Thu Aug 21 2025 (08/21/2025, 16:40:16 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is a Web manager for charitable institutions. Prior to 3.4.10, there is a SQL Injection vulnerability in the /html/funcionario/dependente_remover.php endpoint, specifically in the id_funcionario parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.4.10.

AI-Powered Analysis

AILast updated: 08/21/2025, 17:02:53 UTC

Technical Analysis

CVE-2025-57761 is a critical SQL Injection vulnerability identified in the WeGIA web management system developed by LabRedesCefetRJ, specifically affecting versions prior to 3.4.10. The vulnerability exists in the /html/funcionario/dependente_remover.php endpoint within the id_funcionario parameter. SQL Injection (CWE-89) occurs when user-supplied input is improperly neutralized before being included in SQL queries, allowing attackers to manipulate the database commands executed by the application. In this case, the id_funcionario parameter does not adequately sanitize input, enabling an attacker to inject arbitrary SQL code. This can lead to unauthorized data access, data modification, or deletion, and potentially full compromise of the backend database. The CVSS 4.0 base score of 9.4 reflects the high severity, with network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability (VC:H, VI:H, VA:H), and affects a high scope (SC:H) with significant impact on security controls (SI:H) and security attributes (SA:H). Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make this a significant threat. The issue was addressed in version 3.4.10 of WeGIA, which includes proper input validation and sanitization to prevent SQL Injection attacks.

Potential Impact

For European organizations using WeGIA to manage charitable institutions, this vulnerability poses a severe risk. Exploitation could lead to unauthorized disclosure of sensitive personal and financial data of donors, beneficiaries, and employees, violating GDPR and other data protection regulations. Data integrity could be compromised, resulting in fraudulent records or disruption of operations. Availability of the system could be affected if attackers delete or corrupt database contents, impacting critical services provided by these institutions. The reputational damage and potential regulatory penalties could be substantial. Additionally, since WeGIA is a niche product for charitable organizations, the impact is concentrated but severe for affected entities. The lack of authentication requirement and network accessibility means attackers can exploit this remotely without user interaction, increasing the likelihood of automated attacks or mass scanning by threat actors targeting vulnerable installations.

Mitigation Recommendations

European organizations should immediately verify their WeGIA version and upgrade to 3.4.10 or later to apply the official patch that fixes the SQL Injection vulnerability. If immediate upgrade is not feasible, implement web application firewall (WAF) rules to detect and block malicious SQL payloads targeting the id_funcionario parameter. Conduct thorough input validation and sanitization on all user inputs at the application level as a defense-in-depth measure. Perform regular security audits and penetration testing focusing on injection flaws. Restrict database user permissions to the minimum necessary to limit the impact of potential exploitation. Monitor logs for suspicious activity related to the vulnerable endpoint. Educate development and operations teams about secure coding practices to prevent similar vulnerabilities. Finally, ensure backup and recovery procedures are robust to restore data integrity and availability in case of an attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-19T15:16:22.917Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a74dc4ad5a09ad0012a5c7

Added to database: 8/21/2025, 4:48:04 PM

Last enriched: 8/21/2025, 5:02:53 PM

Last updated: 8/21/2025, 5:47:48 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats