WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was identified in WeGIA versions 3.4.10 and prior inthe endpoint /WeGIA/html/memorando/listar_despachos.php, in the id_memorando parameter. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.4.11 contains a patch.
History

Mon, 08 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was identified in WeGIA versions 3.4.10 and prior inthe endpoint /WeGIA/html/memorando/listar_despachos.php, in the id_memorando parameter. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.4.11 contains a patch.
Title WeGIA vulnerable to Blind Time-Based SQL Injection in endpoint 'listar_despachos.php' parameter 'id_memorando'
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-08T22:35:04.799Z

Reserved: 2025-09-01T20:03:06.534Z

Link: CVE-2025-58454

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-08T23:15:35.613

Modified: 2025-09-08T23:15:35.613

Link: CVE-2025-58454

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.