Skip to main content

CVE-2025-61605: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA

Critical
VulnerabilityCVE-2025-61605cvecve-2025-61605cwe-89
Published: Thu Oct 02 2025 (10/02/2025, 20:13:02 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:14:50 UTC

Technical Analysis

CVE-2025-61605 is a critical SQL Injection vulnerability affecting WeGIA, an open-source web management platform tailored for charitable institutions. The vulnerability exists in versions 3.4.12 and earlier, specifically within the /pet/profile_pet.php endpoint, targeting the id_pet parameter. Improper neutralization of special elements in this parameter allows attackers to inject arbitrary SQL commands. This can lead to unauthorized data disclosure, data manipulation, or even complete compromise of the underlying database. The vulnerability impacts confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially enabling denial-of-service conditions through crafted queries. The CVSS 4.0 score of 9.4 reflects the high severity, with an attack vector that is network-based, requiring low attack complexity, no user interaction, and only low privileges. The vulnerability affects a critical component of the application that manages pet profiles, which may contain sensitive personal or organizational data. The issue has been addressed in WeGIA version 3.5.0, which includes proper input validation and parameterized queries to prevent injection attacks. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact make this a high-risk vulnerability that requires immediate attention.

Potential Impact

For European organizations using WeGIA, particularly charitable institutions, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to donor information, internal records, and other sensitive data, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, undermining trust and operational reliability. Availability impacts could disrupt organizational activities, affecting service delivery and stakeholder engagement. The breach of sensitive data could result in reputational damage, regulatory fines, and legal consequences. Given the critical nature of the vulnerability and the potential for remote exploitation without user interaction, European entities must prioritize patching to avoid these severe consequences.

Mitigation Recommendations

Organizations should immediately upgrade WeGIA installations to version 3.5.0 or later, where the vulnerability is fixed. Until the upgrade is applied, implement strict input validation and sanitization on the id_pet parameter at the web application firewall (WAF) or reverse proxy level to block suspicious SQL syntax patterns. Employ parameterized queries and prepared statements if custom modifications exist. Conduct thorough code reviews and penetration testing focused on SQL injection vectors. Monitor database logs for unusual query patterns indicative of exploitation attempts. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. Additionally, ensure regular backups are maintained and tested for integrity to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-26T16:25:25.151Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68df13500005234f78f726b5

Added to database: 10/3/2025, 12:05:36 AM

Last enriched: 10/3/2025, 12:14:50 AM

Last updated: 10/3/2025, 2:37:11 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats