WeGIA is a Web manager for charitable institutions. Prior to version 3.5.0, WeGIA is vulnerable to SQL Injection attacks in the control.php endpoint with the following parameters: nomeClasse=ProdutoControle&metodo=excluir&id_produto=[malicious command]. It is necessary to apply prepared statements methods, sanitization, and validations on theid_produto parameter. This issue has been patched in version 3.5.0.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* |
Mon, 29 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 29 Sep 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wegia
Wegia wegia |
|
| Vendors & Products |
Wegia
Wegia wegia |
Sat, 27 Sep 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a Web manager for charitable institutions. Prior to version 3.5.0, WeGIA is vulnerable to SQL Injection attacks in the control.php endpoint with the following parameters: nomeClasse=ProdutoControle&metodo=excluir&id_produto=[malicious command]. It is necessary to apply prepared statements methods, sanitization, and validations on theid_produto parameter. This issue has been patched in version 3.5.0. | |
| Title | WeGIA vulnerable to SQL Injection into method `excluir` of the `ProdutoControle` class in the parameter `id_produto`. | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-27T00:38:42.946Z
Updated: 2025-09-29T14:50:30.539Z
Reserved: 2025-09-23T14:33:49.505Z
Link: CVE-2025-59939
Updated: 2025-09-29T14:50:13.223Z
Status : Analyzed
Published: 2025-09-27T01:15:43.903
Modified: 2025-10-06T15:05:36.037
Link: CVE-2025-59939
No data.