WeGIA is a web manager for charitable institutions. An SQL Injection vulnerability was identified in the /html/funcionario/profile_funcionario.php endpoint. The id_funcionario parameter is not properly sanitized or validated before being used in a SQL query, allowing an unauthenticated attacker to inject arbitrary SQL commands. The vulnerability is fixed in 3.4.3.
References
Link | Resource |
---|---|
https://github.com/LabRedesCefetRJ/WeGIA/commit/0a061bcc5024937edd18ab3e65ccc8f38deb6957 | Patch |
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rrj6-pj6w-8j2r | Exploit Vendor Advisory |
Configurations
History
10 Jul 2025, 21:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-07 17:15
Updated : 2025-07-10 21:16
NVD link : CVE-2025-53529
Mitre link : CVE-2025-53529
CVE.ORG link : CVE-2025-53529
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')