WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Time-Based Blind SQL Injection vulnerability was discovered in version 3.3.3 the almox parameter of the `/controle/getProdutosPorAlmox.php` endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration. Version 3.4.0 fixes the issue.
References
Link | Resource |
---|---|
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmf9-2rc3-vvxx | Exploit Vendor Advisory |
Configurations
History
08 Jul 2025, 14:48
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmf9-2rc3-vvxx - Exploit, Vendor Advisory | |
First Time |
Wegia wegia
Wegia |
30 Jun 2025, 18:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Jun 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-27 15:15
Updated : 2025-07-08 14:48
NVD link : CVE-2025-53091
Mitre link : CVE-2025-53091
CVE.ORG link : CVE-2025-53091
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')