WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to 3.5.1, a SQL Injection vulnerability was identified in the /html/funcionario/dependente_listar.php endpoint, specifically in the id_funcionario parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.5.1.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/commit/017fdd71380ab898570752aebc3fe1ef318a5d0d | Patch |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4wrg-g9cj-hjcx | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-10-13 22:15
Updated : 2025-10-20 16:06
NVD link : CVE-2025-62177
Mitre link : CVE-2025-62177
CVE.ORG link : CVE-2025-62177
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
