Home

Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain an SQL Injection vulnerability in the /html/matPat/editar_categoria.php endpoint. The application fails to properly validate and sanitize user inputs in the id_categoria parameter, which allows attackers to inject malicious SQL payloads for direct execution. This issue is fixed in version 3.5.5.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-09 | Updated 2025-12-10 | Assigner GitHub_M




CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 3.5.5
affected

References

github.com/.../WeGIA/security/advisories/GHSA-hj2x-qfm3-2869

github.com/...ommit/f04b91f584a38c2061a071b26219dba3f25819e6

github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.5.5

cve.org (CVE-2025-67501)

nvd.nist.gov (CVE-2025-67501)

Download JSON