Cyber Posture

CVE-2025-26611

CriticalPublic PoC

Published: 18 February 2025

Published
18 February 2025
Modified
28 February 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0047 64.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may leverage databases to mine valuable information.

Security Summary

CVE-2025-26611 is a SQL injection vulnerability in the WeGIA open-source web manager application, primarily targeted at Portuguese-language institutional users. The flaw resides in the `remover_produto.php` endpoint, where insufficient input validation allows attackers to inject and execute arbitrary SQL queries, potentially leading to unauthorized access to sensitive information in the underlying database.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely over the network with low complexity, no authentication privileges, and no user interaction required. Any unauthenticated attacker with network access to a vulnerable WeGIA instance can leverage this to execute arbitrary SQL commands, enabling data exfiltration, modification, deletion, or escalation to full database compromise.

The GitHub Security Advisory (GHSA-q273-4vcj-qqp4) confirms the issue was addressed in WeGIA version 3.2.13, urging all users to upgrade immediately. No workarounds are available.

Details

CWE(s)
CWE-89CWE-284

Affected Products

wegia
wegia
≤ 3.2.13

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in unauthenticated public-facing web endpoint directly enables T1190 for remote exploitation; arbitrary SQL execution facilitates T1213.006 for database data access, exfiltration, modification, and deletion.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References