Unrated severityNVD Advisory· Published Feb 3, 2025· Updated Feb 4, 2025
SQL Injection endpoint 'get_detalhes_socio.php' parameter 'id_socio' in WeGIA
CVE-2025-24957
Description
WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, get_detalhes_socio.php endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected products
1- Range: < 3.2.12
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x28g-6228-99p9mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.