Cyber Posture

CVE-2025-27096

CriticalPublic PoC

Published: 20 February 2025

Published
20 February 2025
Modified
28 February 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0039 59.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-27096 is a SQL injection vulnerability (CWE-89) affecting the WeGIA web application, a Web Manager for Institutions with a focus on the Portuguese language. The issue resides in the personalizacao_upload.php endpoint, where an authorized attacker can execute arbitrary SQL queries to access sensitive information. Published on 2025-02-20, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with network accessibility, low attack complexity, and no privileges or user interaction required.

Attackers can exploit this vulnerability remotely without authentication privileges per the CVSS vector, sending crafted inputs to the endpoint to execute arbitrary SQL commands. Successful exploitation enables high-impact outcomes, including unauthorized access to sensitive data, data modification, or denial of service through database disruption.

The vulnerability has been addressed in WeGIA version 3.2.14, and all users are advised to upgrade promptly. No workarounds are available. For full details, refer to the GitHub Security Advisory at https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j856-wh9m-9vpm.

Details

CWE(s)
CWE-89

Affected Products

wegia
wegia
≤ 3.2.14

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing web app endpoint directly enables remote exploitation for initial access and data impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References