CVE-2025-27133

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in WeGIA allows authenticated attackers to execute arbitrary SQL queries through the adicionar_tipo_exame.php endpoint, potentially accessing sensitive database information. It affects WeGIA installations prior to version 3.2.15. Organizations using vulnerable versions of this charitable institution management software are at risk.

💻 Affected Systems

Products:
  • WeGIA
Versions: All versions prior to 3.2.15
Operating Systems: Any OS running WeGIA
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the vulnerable endpoint

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including exfiltration of sensitive personal data, financial information, and donor records, potentially leading to data breach, identity theft, and regulatory violations.

🟠

Likely Case

Unauthorized access to sensitive information stored in the database, including personal identifiable information (PII) of beneficiaries, donors, and institutional data.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database access controls in place, potentially preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to the application and knowledge of SQL injection techniques

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.15

Vendor Advisory: https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp

Restart Required: No

Instructions:

1. Backup your current WeGIA installation and database. 2. Download version 3.2.15 from the official repository. 3. Replace vulnerable files with patched versions. 4. Verify the fix by checking the commit 619ead748e18e685459c6dc3c226e621b9ff5403 is applied.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for all user inputs in the application

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block malicious requests

🧯 If You Can't Patch

  • Implement network segmentation to isolate the WeGIA application from sensitive systems
  • Enable detailed logging and monitoring for SQL injection attempts on the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check if your WeGIA version is below 3.2.15 and examine the adicionar_tipo_exame.php file for lack of parameterized queries

Check Version:

Check WeGIA version in application interface or examine version files in installation directory

Verify Fix Applied:

Verify that version 3.2.15 is installed and check that the commit 619ead748e18e685459c6dc3c226e621b9ff5403 has been applied to the codebase

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts followed by access to adicionar_tipo_exame.php
  • Database error messages containing SQL syntax

Network Indicators:

  • Unusual database connection patterns from application server
  • Large data transfers from database to unexpected sources

SIEM Query:

source="wegia_logs" AND ("adicionar_tipo_exame.php" AND (sql OR union OR select OR insert OR delete))

🔗 References

📤 Share & Export