Home

Description

WeGIA is a Web manager for charitable institutions. Prior to version 3.5.0, WeGIA is vulnerable to SQL Injection attacks in the control.php endpoint with the following parameters: nomeClasse=ProdutoControle&metodo=excluir&id_produto=[malicious command]. It is necessary to apply prepared statements methods, sanitization, and validations on theid_produto parameter. This issue has been patched in version 3.5.0.

PUBLISHED Reserved 2025-09-23 | Published 2025-09-27 | Updated 2025-09-29 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 3.5.0
affected

References

github.com/.../WeGIA/security/advisories/GHSA-jx9m-pgf8-v489

cve.org (CVE-2025-59939)

nvd.nist.gov (CVE-2025-59939)

Download JSON