Description
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Versions prior to 3.4.5 have a SQL Injection vulnerability in the endpoint `/WeGIA/html/socio/sistema/processa_deletar_socio.php`, in the `id_socio` parameter. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data. Version 3.4.5 fixes the issue.
Product(s):
- Wegia
- WeGIA 0.9.4 Beta
- WeGIA 1.0
- WeGIA 2.0
- WeGIA 2.0 Beta
- WeGIA 3.0
- WeGIA 3.1
- WeGIA 3.2.0
- WeGIA 3.2.10
- WeGIA 3.2.11
- WeGIA 3.2.12
- WeGIA 3.2.13
- WeGIA 3.2.14
- WeGIA 3.2.15
- WeGIA 3.2.16
- WeGIA 3.2.17
- WeGIA 3.2.6
- WeGIA 3.2.7
- WeGIA 3.2.8
- WeGIA 3.2.9
- WeGIA 3.3.0
- WeGIA 3.3.1
- WeGIA 3.3.2
- WeGIA 3.3.3
- WeGIA 3.4.0
- WeGIA 3.4.1
- WeGIA 3.4.2
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-53823, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-53823 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/SQL-Injection
- https://capec.mitre.org/data/definitions/108.html
- https://capec.mitre.org/data/definitions/109.html
- https://capec.mitre.org/data/definitions/110.html
- https://capec.mitre.org/data/definitions/470.html
- https://capec.mitre.org/data/definitions/66.html
- https://capec.mitre.org/data/definitions/7.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-53823