Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62360: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA

0
Critical
VulnerabilityCVE-2025-62360cvecve-2025-62360cwe-89
Published: Mon Oct 13 2025 (10/13/2025, 21:24:48 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users.Prior to 3.5.1, a SQL Injection vulnerability was identified in the /html/funcionario/dependente_documento.php endpoint, specifically in the id_dependente parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.5.1.

AI-Powered Analysis

AILast updated: 10/13/2025, 21:33:50 UTC

Technical Analysis

CVE-2025-62360 is a critical SQL Injection vulnerability classified under CWE-89 affecting the WeGIA open source Web Manager for Institutions, primarily used by Portuguese language users. The vulnerability resides in the id_dependente parameter of the /html/funcionario/dependente_documento.php endpoint in versions prior to 3.5.1. Due to improper neutralization of special elements in SQL commands, attackers can inject malicious SQL code, enabling unauthorized execution of arbitrary SQL queries. This can result in unauthorized data disclosure, data modification, or deletion, and potentially full database compromise. The vulnerability requires no user interaction but does require high privileges, indicating that an attacker must have some level of authenticated access to exploit it. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects network attack vector, low attack complexity, no user interaction, but high privileges required and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the severity and ease of exploitation by privileged users make it a critical threat. The issue is resolved in WeGIA version 3.5.1, which should be applied promptly.

Potential Impact

For European organizations using WeGIA, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of institutional data. Successful exploitation could lead to unauthorized data access, data corruption, or deletion, disrupting institutional operations and potentially causing regulatory compliance violations, especially under GDPR. The impact is particularly severe for educational institutions, government agencies, or any organizations managing sensitive personal or institutional data through WeGIA. The requirement for high privileges to exploit the vulnerability means insider threats or compromised privileged accounts could be leveraged by attackers. The disruption of database availability could also affect service continuity, leading to operational downtime and reputational damage. Given the critical CVSS score and the nature of the vulnerability, the threat is substantial for any European entity relying on this software.

Mitigation Recommendations

1. Immediately upgrade all WeGIA installations to version 3.5.1 or later, where the vulnerability is fixed. 2. Restrict and audit privileged user access to the WeGIA system to minimize the risk of exploitation by insiders or compromised accounts. 3. Implement strict input validation and parameterized queries if custom modifications exist to further reduce SQL injection risks. 4. Monitor database logs and application logs for unusual or unauthorized SQL queries, especially those targeting the id_dependente parameter. 5. Conduct regular security assessments and penetration testing focused on SQL injection vectors within WeGIA deployments. 6. Employ web application firewalls (WAFs) with rules designed to detect and block SQL injection attempts targeting WeGIA endpoints. 7. Educate administrators and developers about secure coding practices and the importance of timely patching. 8. Review and tighten database permissions to ensure the application operates with the least privilege necessary.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-10T14:22:48.202Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ed702cefcc33289f469154

Added to database: 10/13/2025, 9:33:32 PM

Last enriched: 10/13/2025, 9:33:50 PM

Last updated: 10/14/2025, 1:07:13 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats