Vulnerability Description
WeGIA is a web manager for charitable institutions. An unauthenticated SQL Injection vulnerability was identified in versions up to and including 3.3.0 in the endpoint `/html/socio/sistema/get_socios.php`, specifically in the query parameter. This issue allows attackers to inject and execute arbitrary SQL statements against the application's underlying database. As a result, it may lead to data exfiltration, authentication bypass, or complete database compromise. Version 3.3.1 fixes the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wegia | Wegia | < 3.3.1 |
Related Weaknesses (CWE)
References
- https://github.com/LabRedesCefetRJ/WeGIA/commit/214dab59509bd3637f94adf381298c12Patch
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5qw5-q55h-6qg7ExploitVendor Advisory
FAQ
What is CVE-2025-46828?
CVE-2025-46828 is a vulnerability with a CVSS score of 9.8 (CRITICAL). WeGIA is a web manager for charitable institutions. An unauthenticated SQL Injection vulnerability was identified in versions up to and including 3.3.0 in the endpoint `/html/socio/sistema/get_socios...
How severe is CVE-2025-46828?
CVE-2025-46828 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-46828?
Check the references section above for vendor advisories and patch information. Affected products include: Wegia Wegia.