Cyber Posture

CVE-2025-30365

CriticalPublic PoC

Published: 27 March 2025

Published
27 March 2025
Modified
10 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0079 73.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-30365 is a SQL injection vulnerability (CWE-89) in WeGIA, a web manager for charitable institutions, affecting versions prior to 3.2.8. The flaw exists in the endpoint /WeGIA/html/socio/sistema/controller/query_geracao_auto.php, specifically in the query parameter, which fails to properly sanitize input. This allows attackers to inject and execute arbitrary SQL commands, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to high impacts on confidentiality, integrity, and availability.

Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. By crafting malicious payloads in the query parameter, they can execute arbitrary SQL commands against the database, enabling data exfiltration, modification, deletion, or denial-of-service conditions.

The GitHub security advisory (GHSA-ghx8-h92j-h422) confirms that upgrading to WeGIA version 3.2.8 resolves the issue by addressing the injection vulnerability in the affected endpoint.

Details

CWE(s)
CWE-89

Affected Products

wegia
wegia
≤ 3.2.8

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing web app endpoint allows unauthenticated remote exploitation, directly mapping to T1190 Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References