CVE-2025-61605: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
AI Analysis
Technical Summary
CVE-2025-61605 is a critical SQL Injection vulnerability affecting WeGIA, an open-source web management platform tailored for charitable institutions. The vulnerability exists in versions 3.4.12 and earlier, specifically within the /pet/profile_pet.php endpoint, targeting the id_pet parameter. Improper neutralization of special elements in this parameter allows attackers to inject arbitrary SQL commands. This can lead to unauthorized data disclosure, data manipulation, or even complete compromise of the underlying database. The vulnerability impacts confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially enabling denial-of-service conditions through crafted queries. The CVSS 4.0 score of 9.4 reflects the high severity, with an attack vector that is network-based, requiring low attack complexity, no user interaction, and only low privileges. The vulnerability affects a critical component of the application that manages pet profiles, which may contain sensitive personal or organizational data. The issue has been addressed in WeGIA version 3.5.0, which includes proper input validation and parameterized queries to prevent injection attacks. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact make this a high-risk vulnerability that requires immediate attention.
Potential Impact
For European organizations using WeGIA, particularly charitable institutions, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to donor information, internal records, and other sensitive data, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, undermining trust and operational reliability. Availability impacts could disrupt organizational activities, affecting service delivery and stakeholder engagement. The breach of sensitive data could result in reputational damage, regulatory fines, and legal consequences. Given the critical nature of the vulnerability and the potential for remote exploitation without user interaction, European entities must prioritize patching to avoid these severe consequences.
Mitigation Recommendations
Organizations should immediately upgrade WeGIA installations to version 3.5.0 or later, where the vulnerability is fixed. Until the upgrade is applied, implement strict input validation and sanitization on the id_pet parameter at the web application firewall (WAF) or reverse proxy level to block suspicious SQL syntax patterns. Employ parameterized queries and prepared statements if custom modifications exist. Conduct thorough code reviews and penetration testing focused on SQL injection vectors. Monitor database logs for unusual query patterns indicative of exploitation attempts. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Additionally, ensure regular backups are maintained and tested for integrity to enable recovery in case of data corruption or loss.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-61605: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
Description
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-61605 is a critical SQL Injection vulnerability affecting WeGIA, an open-source web management platform tailored for charitable institutions. The vulnerability exists in versions 3.4.12 and earlier, specifically within the /pet/profile_pet.php endpoint, targeting the id_pet parameter. Improper neutralization of special elements in this parameter allows attackers to inject arbitrary SQL commands. This can lead to unauthorized data disclosure, data manipulation, or even complete compromise of the underlying database. The vulnerability impacts confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially enabling denial-of-service conditions through crafted queries. The CVSS 4.0 score of 9.4 reflects the high severity, with an attack vector that is network-based, requiring low attack complexity, no user interaction, and only low privileges. The vulnerability affects a critical component of the application that manages pet profiles, which may contain sensitive personal or organizational data. The issue has been addressed in WeGIA version 3.5.0, which includes proper input validation and parameterized queries to prevent injection attacks. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact make this a high-risk vulnerability that requires immediate attention.
Potential Impact
For European organizations using WeGIA, particularly charitable institutions, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to donor information, internal records, and other sensitive data, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, undermining trust and operational reliability. Availability impacts could disrupt organizational activities, affecting service delivery and stakeholder engagement. The breach of sensitive data could result in reputational damage, regulatory fines, and legal consequences. Given the critical nature of the vulnerability and the potential for remote exploitation without user interaction, European entities must prioritize patching to avoid these severe consequences.
Mitigation Recommendations
Organizations should immediately upgrade WeGIA installations to version 3.5.0 or later, where the vulnerability is fixed. Until the upgrade is applied, implement strict input validation and sanitization on the id_pet parameter at the web application firewall (WAF) or reverse proxy level to block suspicious SQL syntax patterns. Employ parameterized queries and prepared statements if custom modifications exist. Conduct thorough code reviews and penetration testing focused on SQL injection vectors. Monitor database logs for unusual query patterns indicative of exploitation attempts. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Additionally, ensure regular backups are maintained and tested for integrity to enable recovery in case of data corruption or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-26T16:25:25.151Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68df13500005234f78f726b5
Added to database: 10/3/2025, 12:05:36 AM
Last enriched: 10/3/2025, 12:14:50 AM
Last updated: 10/3/2025, 2:37:11 AM
Views: 7
Related Threats
CVE-2025-11241: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Yoast SEO Premium
MediumCVE-2025-60782: n/a
HighCVE-2025-54087: Vulnerability in Absolute Security Secure Access
LowCVE-2025-54089: Vulnerability in Absolute Security Secure Access
MediumCVE-2025-54088: Vulnerability in Absolute Security Secure Access
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.