Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61605: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA

0
Critical
VulnerabilityCVE-2025-61605cvecve-2025-61605cwe-89
Published: Thu Oct 02 2025 (10/02/2025, 20:13:02 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.

AI-Powered Analysis

AILast updated: 10/10/2025, 06:02:19 UTC

Technical Analysis

CVE-2025-61605 is a critical SQL Injection vulnerability identified in the WeGIA web management platform, primarily used by charitable organizations. The vulnerability resides in the /pet/profile_pet.php endpoint, specifically within the id_pet parameter, which fails to properly neutralize special characters in SQL commands. This improper sanitization allows attackers to inject arbitrary SQL code, potentially leading to unauthorized data access, data modification, or deletion, and even full database compromise. The vulnerability requires no user interaction and can be exploited remotely over the network by attackers with low privileges, making it highly accessible. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects a network attack vector with low complexity, no authentication required, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature of the flaw and the widespread use of WeGIA in charitable sectors necessitate urgent remediation. The vendor has addressed the issue in version 3.5.0, which includes proper input validation and parameterized queries to prevent SQL injection. Organizations running affected versions should prioritize upgrading and consider additional protective measures such as web application firewalls and database activity monitoring to detect and block exploitation attempts.

Potential Impact

For European organizations, especially those in the charitable and non-profit sectors using WeGIA, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized disclosure of sensitive donor and beneficiary data, manipulation or deletion of records, and disruption of service availability. Such impacts can damage organizational reputation, lead to regulatory penalties under GDPR due to data breaches, and impair operational capabilities. The critical severity and ease of exploitation mean attackers could rapidly compromise systems without needing user interaction or elevated privileges. This threat is particularly concerning for organizations handling sensitive personal data or financial information. Additionally, the potential for data integrity compromise could undermine trust in these institutions. The lack of known exploits in the wild currently provides a small window for proactive defense, but the risk of imminent exploitation attempts remains high.

Mitigation Recommendations

1. Immediately upgrade all WeGIA installations to version 3.5.0 or later, which contains the fix for this SQL Injection vulnerability. 2. Implement web application firewalls (WAFs) with specific rules to detect and block SQL injection attempts targeting the /pet/profile_pet.php endpoint and the id_pet parameter. 3. Conduct thorough code reviews and penetration testing on custom or integrated modules interacting with the database to identify any residual injection points. 4. Employ database activity monitoring tools to detect anomalous queries indicative of injection attacks. 5. Enforce least privilege principles on database accounts used by WeGIA, limiting permissions to only necessary operations. 6. Regularly audit logs for suspicious activity related to SQL queries and access patterns. 7. Educate IT and security teams about the vulnerability and ensure rapid incident response capabilities are in place. 8. Consider network segmentation to isolate critical databases and limit exposure. 9. Maintain up-to-date backups to enable recovery in case of data corruption or deletion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-26T16:25:25.151Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68df13500005234f78f726b5

Added to database: 10/3/2025, 12:05:36 AM

Last enriched: 10/10/2025, 6:02:19 AM

Last updated: 11/16/2025, 5:52:23 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats