WeGIA is a web manager for charitable institutions. A Time-Based Blind SQL Injection vulnerability was discovered in the almox parameter of the /controle/relatorio_geracao.php endpoint. This issue allows attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration. This vulnerability is fixed in 3.4.1.
References
Link | Resource |
---|---|
https://github.com/LabRedesCefetRJ/WeGIA/commit/9de9a741d1d26ae76b2215a32660817d9bd452aa | Patch |
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43xw-c4g6-jgff | Exploit Vendor Advisory |
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43xw-c4g6-jgff | Exploit Vendor Advisory |
Configurations
History
10 Jul 2025, 21:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-07 17:15
Updated : 2025-07-10 21:16
NVD link : CVE-2025-53527
Mitre link : CVE-2025-53527
CVE.ORG link : CVE-2025-53527
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')