Skip to main content

CVE-2025-58453: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA

High
VulnerabilityCVE-2025-58453cvecve-2025-58453cwe-89
Published: Mon Sep 08 2025 (09/08/2025, 22:28:40 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was identified in WeGIA versions 3.4.10 and prior in the endpoint /WeGIA/html/memorando/exibe_anexo.php, in the id_anexo parameter. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.4.11 contains a patch.

AI-Powered Analysis

AILast updated: 09/08/2025, 22:46:36 UTC

Technical Analysis

CVE-2025-58453 is a high-severity SQL Injection vulnerability (CWE-89) found in the WeGIA web management system developed by LabRedesCefetRJ, specifically affecting versions prior to 3.4.11. WeGIA is a web-based platform used by charitable institutions to manage their operations. The vulnerability exists in the /WeGIA/html/memorando/exibe_anexo.php endpoint, where the id_anexo parameter is improperly sanitized. This improper neutralization of special elements in SQL commands allows an attacker to inject arbitrary SQL queries. Notably, the vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. Successful exploitation can lead to unauthorized access to sensitive information stored in the backend database, potentially compromising confidentiality, integrity, and availability of data. The CVSS 4.0 base score is 8.9, reflecting the critical nature of this flaw with network attack vector, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability is patched in version 3.4.11, and users are strongly advised to upgrade. The lack of authentication requirement and the direct exposure of the vulnerable parameter in a web endpoint increase the risk of exploitation, especially in environments where WeGIA is accessible from the internet or untrusted networks.

Potential Impact

For European organizations using WeGIA, particularly charitable institutions and NGOs, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive donor information, internal communications, and operational data, undermining trust and potentially violating data protection regulations such as the GDPR. The integrity of stored data could also be compromised, allowing attackers to alter records or disrupt operations. Given the criticality of the vulnerability and the ease of exploitation, attackers could leverage this flaw to gain persistent access or pivot to other internal systems. This could result in reputational damage, financial loss, and legal consequences for affected organizations. Furthermore, since WeGIA is tailored for charitable institutions, the impact extends beyond data loss to potentially disrupting essential social services and support activities.

Mitigation Recommendations

European organizations should immediately verify their WeGIA version and upgrade to version 3.4.11 or later, which contains the patch for this vulnerability. If immediate upgrade is not feasible, organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the id_anexo parameter. Input validation and parameterized queries should be enforced at the application level to prevent injection. Network segmentation and restricting access to the WeGIA management interface to trusted IP addresses can reduce exposure. Regular security assessments and penetration testing focused on injection flaws should be conducted. Additionally, monitoring logs for suspicious query patterns and anomalous access attempts can provide early detection of exploitation attempts. Organizations should also review and update their incident response plans to address potential data breaches stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-01T20:03:06.533Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf5946d5a2966cfc83c8f5

Added to database: 9/8/2025, 10:31:34 PM

Last enriched: 9/8/2025, 10:46:36 PM

Last updated: 9/10/2025, 4:07:21 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats