CVE-2025-24901

8.8 HIGH

📋 TL;DR

A SQL injection vulnerability in WeGIA's deletar_permissao.php endpoint allows authenticated attackers to execute arbitrary SQL queries. This could lead to data theft, modification, or deletion of sensitive charity information. All WeGIA installations before version 3.2.12 are affected.

💻 Affected Systems

Products:
  • WeGIA (Web Manager for Charitable Institutions)
Versions: All versions before 3.2.12
Operating Systems: Any OS running WeGIA (typically Linux with Apache/PHP)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker authentication - only exploitable by users with access to the deletar_permissao.php endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including exfiltration of donor data, financial records, beneficiary information, and potential destruction of all application data.

🟠

Likely Case

Unauthorized access to sensitive personal information (PII) of donors and beneficiaries, modification of permissions, and potential privilege escalation.

🟢

If Mitigated

Limited impact due to network segmentation, minimal database privileges, and proper input validation at other layers.

🌐 Internet-Facing: HIGH - Web applications exposed to the internet are directly accessible to attackers who can exploit this vulnerability after obtaining valid credentials.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials could exploit this, but network segmentation reduces external attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and SQL injection knowledge. No public exploit code is available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.12

Vendor Advisory: https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jp48-94wm-3gmc

Restart Required: No

Instructions:

1. Backup your current WeGIA installation and database. 2. Download version 3.2.12 from the official repository. 3. Replace the vulnerable deletar_permissao.php file with the patched version. 4. Verify the application functions correctly.

🔧 Temporary Workarounds

No official workarounds

all

The vendor states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to WeGIA application only to authorized users
  • Enable detailed SQL query logging and monitor for suspicious database activity patterns

🔍 How to Verify

Check if Vulnerable:

Check if deletar_permissao.php exists in your WeGIA installation and examine the code for lack of prepared statements/parameterized queries.

Check Version:

Check the WeGIA admin dashboard or examine version files in the installation directory.

Verify Fix Applied:

Verify the version number in WeGIA's admin interface shows 3.2.12 or higher, and check that deletar_permissao.php uses parameterized queries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed permission deletion attempts
  • SQL syntax errors in application logs

Network Indicators:

  • Unusual patterns of requests to deletar_permissao.php endpoint
  • SQL keywords in HTTP POST parameters

SIEM Query:

source="web_logs" AND uri="*deletar_permissao.php*" AND (param="*SELECT*" OR param="*UNION*" OR param="*DELETE*" OR param="*DROP*")

🔗 References

📤 Share & Export