WeGIA is a Web manager for charitable institutions. Prior to version 3.5.0, WeGIA is vulnerable to SQL Injection attacks in the control.php endpoint with the following parameters: nomeClasse=ProdutoControle&metodo=excluir&id_produto=[malicious command]. It is necessary to apply prepared statements methods, sanitization, and validations on theid_produto parameter. This issue has been patched in version 3.5.0.
References
Link | Resource |
---|---|
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jx9m-pgf8-v489 | Exploit Third Party Advisory |
Configurations
History
06 Oct 2025, 15:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jx9m-pgf8-v489 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
First Time |
Wegia
Wegia wegia |
27 Sep 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-27 01:15
Updated : 2025-10-06 15:05
NVD link : CVE-2025-59939
Mitre link : CVE-2025-59939
CVE.ORG link : CVE-2025-59939
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')