CVE-2025-61605: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
AI Analysis
Technical Summary
CVE-2025-61605 is a critical SQL Injection vulnerability identified in the WeGIA web management platform, primarily used by charitable organizations. The vulnerability resides in the /pet/profile_pet.php endpoint, specifically within the id_pet parameter, which fails to properly neutralize special characters in SQL commands. This improper sanitization allows attackers to inject arbitrary SQL code, potentially leading to unauthorized data access, data modification, or deletion, and even full database compromise. The vulnerability requires no user interaction and can be exploited remotely over the network by attackers with low privileges, making it highly accessible. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects a network attack vector with low complexity, no authentication required, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature of the flaw and the widespread use of WeGIA in charitable sectors necessitate urgent remediation. The vendor has addressed the issue in version 3.5.0, which includes proper input validation and parameterized queries to prevent SQL injection. Organizations running affected versions should prioritize upgrading and consider additional protective measures such as web application firewalls and database activity monitoring to detect and block exploitation attempts.
Potential Impact
For European organizations, especially those in the charitable and non-profit sectors using WeGIA, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized disclosure of sensitive donor and beneficiary data, manipulation or deletion of records, and disruption of service availability. Such impacts can damage organizational reputation, lead to regulatory penalties under GDPR due to data breaches, and impair operational capabilities. The critical severity and ease of exploitation mean attackers could rapidly compromise systems without needing user interaction or elevated privileges. This threat is particularly concerning for organizations handling sensitive personal data or financial information. Additionally, the potential for data integrity compromise could undermine trust in these institutions. The lack of known exploits in the wild currently provides a small window for proactive defense, but the risk of imminent exploitation attempts remains high.
Mitigation Recommendations
1. Immediately upgrade all WeGIA installations to version 3.5.0 or later, which contains the fix for this SQL Injection vulnerability. 2. Implement web application firewalls (WAFs) with specific rules to detect and block SQL injection attempts targeting the /pet/profile_pet.php endpoint and the id_pet parameter. 3. Conduct thorough code reviews and penetration testing on custom or integrated modules interacting with the database to identify any residual injection points. 4. Employ database activity monitoring tools to detect anomalous queries indicative of injection attacks. 5. Enforce least privilege principles on database accounts used by WeGIA, limiting permissions to only necessary operations. 6. Regularly audit logs for suspicious activity related to SQL queries and access patterns. 7. Educate IT and security teams about the vulnerability and ensure rapid incident response capabilities are in place. 8. Consider network segmentation to isolate critical databases and limit exposure. 9. Maintain up-to-date backups to enable recovery in case of data corruption or deletion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-61605: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-61605 is a critical SQL Injection vulnerability identified in the WeGIA web management platform, primarily used by charitable organizations. The vulnerability resides in the /pet/profile_pet.php endpoint, specifically within the id_pet parameter, which fails to properly neutralize special characters in SQL commands. This improper sanitization allows attackers to inject arbitrary SQL code, potentially leading to unauthorized data access, data modification, or deletion, and even full database compromise. The vulnerability requires no user interaction and can be exploited remotely over the network by attackers with low privileges, making it highly accessible. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects a network attack vector with low complexity, no authentication required, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature of the flaw and the widespread use of WeGIA in charitable sectors necessitate urgent remediation. The vendor has addressed the issue in version 3.5.0, which includes proper input validation and parameterized queries to prevent SQL injection. Organizations running affected versions should prioritize upgrading and consider additional protective measures such as web application firewalls and database activity monitoring to detect and block exploitation attempts.
Potential Impact
For European organizations, especially those in the charitable and non-profit sectors using WeGIA, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized disclosure of sensitive donor and beneficiary data, manipulation or deletion of records, and disruption of service availability. Such impacts can damage organizational reputation, lead to regulatory penalties under GDPR due to data breaches, and impair operational capabilities. The critical severity and ease of exploitation mean attackers could rapidly compromise systems without needing user interaction or elevated privileges. This threat is particularly concerning for organizations handling sensitive personal data or financial information. Additionally, the potential for data integrity compromise could undermine trust in these institutions. The lack of known exploits in the wild currently provides a small window for proactive defense, but the risk of imminent exploitation attempts remains high.
Mitigation Recommendations
1. Immediately upgrade all WeGIA installations to version 3.5.0 or later, which contains the fix for this SQL Injection vulnerability. 2. Implement web application firewalls (WAFs) with specific rules to detect and block SQL injection attempts targeting the /pet/profile_pet.php endpoint and the id_pet parameter. 3. Conduct thorough code reviews and penetration testing on custom or integrated modules interacting with the database to identify any residual injection points. 4. Employ database activity monitoring tools to detect anomalous queries indicative of injection attacks. 5. Enforce least privilege principles on database accounts used by WeGIA, limiting permissions to only necessary operations. 6. Regularly audit logs for suspicious activity related to SQL queries and access patterns. 7. Educate IT and security teams about the vulnerability and ensure rapid incident response capabilities are in place. 8. Consider network segmentation to isolate critical databases and limit exposure. 9. Maintain up-to-date backups to enable recovery in case of data corruption or deletion.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-26T16:25:25.151Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68df13500005234f78f726b5
Added to database: 10/3/2025, 12:05:36 AM
Last enriched: 10/10/2025, 6:02:19 AM
Last updated: 11/16/2025, 5:52:23 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13238: Unrestricted Upload in Bdtask Flight Booking Software
MediumCVE-2025-13237: SQL Injection in itsourcecode Inventory Management System
MediumCVE-2025-13236: SQL Injection in itsourcecode Inventory Management System
MediumCVE-2025-12482: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ameliabooking Booking for Appointments and Events Calendar – Amelia
HighCVE-2025-13235: SQL Injection in itsourcecode Inventory Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.