Impact
The loadBackupDB function in WeGIA imports SQL files from uploaded backup archives without validating their contents. An attacker can embed arbitrary SQL statements that create rogue administrator accounts, change existing passwords, or perform any database operation. This flaw allows full compromise of the application’s data, affecting confidentiality, integrity, and availability.
Affected Systems
LabRedesCefetRJ’s WeGIA web manager, versions 3.6.5 and 3.6.6, is affected by this vulnerability. These releases lack content validation for backup imports. The issue is fixed in version 3.6.7 and later.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity, while the EPSS score of less than 1% suggests low current exploit probability and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is via the upload of a malicious backup archive; an attacker can remotely inject arbitrary SQL through this path. With no safeguards, the attacker can gain full database control on the affected installations.
OpenCVE Enrichment