WeGIA is a Web manager for charitable institutions. An OS Command Injection vulnerability was discovered in versions prior to 3.2.15 of the WeGIA application, `importar_dump.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. The command is basically a command to move a temporary file, so a webshell upload is also possible. Version 3.2.15 contains a patch for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/commit/7d0df8c9a0b8b7d6862bbc23dc729d73e39672a1 | Patch |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xw6w-x28r-2p5c | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-02-24 22:15
Updated : 2025-02-28 16:35
NVD link : CVE-2025-27140
Mitre link : CVE-2025-27140
CVE.ORG link : CVE-2025-27140
JSON object : View
Products Affected
wegia
- wegia
