Impact
An authenticated SQL Injection flaw exists in the Atendido_ocorrenciaControle endpoint of the WeGIA web manager, triggered via the id_memorando parameter. Because the attacker can insert arbitrary SQL, the flaw permits full database exfiltration, sensitive personal data exposure, and, in misconfigured setups, arbitrary file reads. The weakness is a classic injection error (CWE‑89).
Affected Systems
The vulnerability affects installations of WeGIA prior to version 3.6.2. The application is developed and distributed by LabRedesCefetRJ. Versions older than 3.6.2 are unpatched; the fix is included in release 3.6.2 and later.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity level, while the EPSS score of <1% suggests a low but non-zero probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Attackers would need authenticated access to the application, likely by compromising legitimate user credentials, to supply malicious id_memorando values. Once active, the injection can lead to full data exfiltration or file reads if misconfigured database permissions exist.
OpenCVE Enrichment