Cyber Posture

CVE-2025-24905

CriticalPublic PoC

Published: 03 February 2025

Published
03 February 2025
Modified
13 February 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0038 59.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-24905 is a SQL injection vulnerability in the WeGIA application, a web manager for charitable institutions. The flaw resides in the `get_codigobarras_cobranca.php` endpoint, where insufficient input validation allows arbitrary SQL query execution. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-89. The vulnerability affects WeGIA versions prior to 3.2.12.

An authorized attacker can exploit this vulnerability remotely with low complexity, requiring no privileges, user interaction, or special conditions. Successful exploitation enables execution of arbitrary SQL queries, potentially granting access to or deletion of sensitive information in the database.

The issue has been addressed in WeGIA version 3.2.12, and all users are advised to upgrade immediately. No workarounds are known. Additional details are available in the GitHub Security Advisory at https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qjc6-5qv6-fr8m.

Details

CWE(s)
CWE-89

Affected Products

wegia
wegia
≤ 3.2.12

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The SQL injection vulnerability in the publicly accessible WeGIA web application endpoint directly enables remote exploitation of a public-facing application without authentication, matching T1190.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References