WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 03 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Oct 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wegia
Wegia wegia |
|
| Vendors & Products |
Wegia
Wegia wegia |
Thu, 02 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0. | |
| Title | WeGIA: SQL Injection (Blind Time-Based) Vulnerability in /pet/profile_pet.php Endpoint | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-02T20:13:02.815Z
Updated: 2025-10-03T15:00:26.377Z
Reserved: 2025-09-26T16:25:25.151Z
Link: CVE-2025-61605
Updated: 2025-10-03T15:00:13.998Z
Status : Analyzed
Published: 2025-10-02T21:16:01.340
Modified: 2025-10-07T15:42:02.167
Link: CVE-2025-61605
No data.