SQL Injection Vulnerability in WeGIA Application for Educational Institutions
CVE-2025-26605

9.4CRITICAL

Key Information:

Status
Vendor
CVE Published:
18 February 2025

What is CVE-2025-26605?

CVE-2025-26605 is a SQL Injection vulnerability identified in the WeGIA application, designed to serve educational institutions, primarily in Portuguese-speaking regions. This open-source web management tool is intended to facilitate various administrative tasks within educational environments. The vulnerability resides within the deletar_cargo.php endpoint, which can be exploited by authorized attackers to execute arbitrary SQL queries. Such an exploitation could lead to unauthorized access to sensitive information, potentially jeopardizing the privacy and security of users and institutional data.

Technical Details

The vulnerability occurs due to inadequate input validation in the WeGIA application's SQL query handling processes. As a result, an attacker with valid credentials could inject malicious SQL code through the specified endpoint, leading to unintended data manipulation or exposure. The flaw has been addressed in version 3.2.13 of the application, and users are urged to upgrade to this version to mitigate the risk of exploitation.

Potential Impact of CVE-2025-26605

  1. Data Breach: The ability for attackers to execute arbitrary SQL queries allows them to access sensitive information stored in the application's database, potentially leading to significant data breaches involving student and institutional records.

  2. Unauthorized Data Manipulation: If exploited, this vulnerability could enable attackers to alter or delete critical data, resulting in operational disruptions and loss of trust in the institution's data integrity.

  3. Regulatory Compliance Risks: Access to sensitive educational data may violate data protection regulations, leading to legal consequences and financial penalties for the affected institutions.

Affected Version(s)

WeGIA < 3.2.13

References

CVSS V4

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.