Impact
WeGIA, a web manager for charitable institutions, contains a SQL injection flaw in the restaurar_produto.php file. The id_produto value from the $_GET request is inserted directly into a SQL query without any parameterization or sanitization, allowing an attacker to manipulate the query argument. This flaw is a classic example of CWE-89 and could enable unauthorized reading, modification, or deletion of product data, and potentially broader database compromise if the attacker can elevate their privileges in the resulting SQL context.
Affected Systems
The vulnerability exists in all releases of WeGIA prior to version 3.6.6, including 3.6.5 and earlier. The vendor identified the affected product as LabRedesCefetRJ:WeGIA.
Risk and Exploitability
The CVSS score for this issue is 8.8, indicating a high severity level. The EPSS score is less than 1%, suggesting that, at present, exploitation is unlikely but still possible in environments that expose the vulnerable endpoint. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation would likely occur remotely through a crafted URL containing a malicious id_produto value, though the specific authentication state required is not detailed in the source information.
OpenCVE Enrichment