CVE-2025-26612
📋 TL;DR
CVE-2025-26612 is a critical SQL injection vulnerability in WeGIA's adicionar_almoxarife.php endpoint that allows attackers to execute arbitrary SQL queries. This could lead to unauthorized access to sensitive database information including user credentials, personal data, and system configurations. All WeGIA users running versions before 3.2.13 are affected.
💻 Affected Systems
- WeGIA
📦 What is this software?
Wegia by Wegia
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise allowing data theft, privilege escalation, and potential remote code execution through database functions.
Likely Case
Unauthorized access to sensitive information including user credentials, personal data, and application configuration.
If Mitigated
Limited impact with proper input validation and database permission restrictions, but still potential for information disclosure.
🎯 Exploit Status
SQL injection vulnerabilities are commonly weaponized. The advisory suggests exploitation is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.2.13
Vendor Advisory: https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9cwj-p4x6-pp88
Restart Required: Yes
Instructions:
1. Backup your current WeGIA installation and database. 2. Download WeGIA version 3.2.13 from the official repository. 3. Replace the existing installation with the new version. 4. Restart the web server service. 5. Verify the application functions correctly.
🧯 If You Can't Patch
- Implement a web application firewall (WAF) with SQL injection detection rules.
- Restrict network access to the WeGIA application to trusted IP addresses only.
🔍 How to Verify
Check if Vulnerable:
Check if your WeGIA version is below 3.2.13 by examining the application version in the admin interface or checking the source code.
Check Version:
Check the WeGIA admin dashboard or examine the application's configuration files for version information.
Verify Fix Applied:
Verify the application version shows 3.2.13 or higher in the admin interface.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL query patterns in database logs
- Multiple failed login attempts or unusual parameter values in web server logs for adicionar_almoxarife.php
Network Indicators:
- HTTP requests to adicionar_almoxarife.php with SQL keywords in parameters
- Unusual database connection patterns from the web server
SIEM Query:
source="web_server" AND uri="*adicionar_almoxarife.php*" AND (param="*SELECT*" OR param="*UNION*" OR param="*INSERT*" OR param="*DELETE*" OR param="*UPDATE*")