CVE-2025-58454: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was identified in WeGIA versions 3.4.10 and prior inthe endpoint /WeGIA/html/memorando/listar_despachos.php, in the id_memorando parameter. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.4.11 contains a patch.
AI Analysis
Technical Summary
CVE-2025-58454 is a high-severity SQL Injection vulnerability (CWE-89) affecting the WeGIA web management software developed by LabRedesCefetRJ, specifically versions prior to 3.4.11. The vulnerability exists in the /WeGIA/html/memorando/listar_despachos.php endpoint within the id_memorando parameter. This parameter is improperly sanitized, allowing an attacker to inject malicious SQL commands. Exploitation does not require authentication or user interaction, and the attack vector is network-based, making it remotely exploitable. Successful exploitation enables an attacker to execute arbitrary SQL queries on the backend database, potentially leading to unauthorized access to sensitive data, data modification, or disruption of service. The CVSS 4.0 base score is 8.9, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a critical risk for organizations using affected versions of WeGIA. The vendor has released version 3.4.11 containing a patch that properly neutralizes special SQL elements in the vulnerable parameter, mitigating the risk.
Potential Impact
For European organizations using WeGIA to manage charitable institutions or related operations, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive personal or financial data, undermining privacy compliance obligations such as GDPR. Data integrity could be compromised, affecting operational reliability and trustworthiness of records. Availability impacts could disrupt critical workflows in charitable organizations, potentially delaying aid or services. Given the lack of authentication requirements, attackers can exploit this remotely, increasing the threat surface. The reputational damage and potential regulatory penalties from data breaches could be substantial. Organizations relying on WeGIA should consider the vulnerability a priority for remediation to maintain operational security and compliance.
Mitigation Recommendations
European organizations should immediately verify their WeGIA version and upgrade to version 3.4.11 or later, which contains the official patch. Until upgrade is possible, implement strict input validation and parameterized queries or prepared statements at the application level to neutralize SQL injection attempts. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection patterns on the vulnerable endpoint to provide temporary protection. Conduct thorough security audits and penetration testing focusing on SQL injection vectors in WeGIA deployments. Monitor logs for suspicious query patterns or unexpected database errors. Restrict network access to the WeGIA management interface to trusted IPs where feasible. Educate staff on the risks and signs of exploitation attempts. Finally, maintain regular backups of critical data to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-58454: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
Description
WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was identified in WeGIA versions 3.4.10 and prior inthe endpoint /WeGIA/html/memorando/listar_despachos.php, in the id_memorando parameter. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.4.11 contains a patch.
AI-Powered Analysis
Technical Analysis
CVE-2025-58454 is a high-severity SQL Injection vulnerability (CWE-89) affecting the WeGIA web management software developed by LabRedesCefetRJ, specifically versions prior to 3.4.11. The vulnerability exists in the /WeGIA/html/memorando/listar_despachos.php endpoint within the id_memorando parameter. This parameter is improperly sanitized, allowing an attacker to inject malicious SQL commands. Exploitation does not require authentication or user interaction, and the attack vector is network-based, making it remotely exploitable. Successful exploitation enables an attacker to execute arbitrary SQL queries on the backend database, potentially leading to unauthorized access to sensitive data, data modification, or disruption of service. The CVSS 4.0 base score is 8.9, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a critical risk for organizations using affected versions of WeGIA. The vendor has released version 3.4.11 containing a patch that properly neutralizes special SQL elements in the vulnerable parameter, mitigating the risk.
Potential Impact
For European organizations using WeGIA to manage charitable institutions or related operations, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive personal or financial data, undermining privacy compliance obligations such as GDPR. Data integrity could be compromised, affecting operational reliability and trustworthiness of records. Availability impacts could disrupt critical workflows in charitable organizations, potentially delaying aid or services. Given the lack of authentication requirements, attackers can exploit this remotely, increasing the threat surface. The reputational damage and potential regulatory penalties from data breaches could be substantial. Organizations relying on WeGIA should consider the vulnerability a priority for remediation to maintain operational security and compliance.
Mitigation Recommendations
European organizations should immediately verify their WeGIA version and upgrade to version 3.4.11 or later, which contains the official patch. Until upgrade is possible, implement strict input validation and parameterized queries or prepared statements at the application level to neutralize SQL injection attempts. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection patterns on the vulnerable endpoint to provide temporary protection. Conduct thorough security audits and penetration testing focusing on SQL injection vectors in WeGIA deployments. Monitor logs for suspicious query patterns or unexpected database errors. Restrict network access to the WeGIA management interface to trusted IPs where feasible. Educate staff on the risks and signs of exploitation attempts. Finally, maintain regular backups of critical data to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-01T20:03:06.534Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf5ce1d5a2966cfc83ddbe
Added to database: 9/8/2025, 10:46:57 PM
Last enriched: 9/16/2025, 1:07:53 AM
Last updated: 10/30/2025, 4:52:11 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62726: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in n8n-io n8n
HighCVE-2025-61121: n/a
UnknownCVE-2025-61120: n/a
UnknownCVE-2025-60319: n/a
UnknownCVE-2024-7652: Vulnerability in Mozilla Firefox
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.