CVE-2025-27096
Published: 20 February 2025
Summary
CVE-2025-27096 is a critical-severity SQL Injection (CWE-89) vulnerability in Wegia Wegia. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection attacks by validating and sanitizing untrusted inputs to the personalizacao_upload.php endpoint before database queries.
Addresses the flaw remediation by requiring timely identification, patching, and upgrade to WeGIA version 3.2.14 to eliminate the SQL injection vulnerability.
Boundary protection with web application firewalls inspects and blocks crafted SQL injection payloads targeting the vulnerable network-accessible endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app endpoint directly enables remote exploitation for initial access and data impact.
NVD Description
WeGIA is a Web Manager for Institutions with a focus on Portuguese language. A SQL Injection vulnerability was discovered in the WeGIA application, personalizacao_upload.php endpoint. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive…
more
information. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Deeper analysisAI
CVE-2025-27096 is a SQL injection vulnerability (CWE-89) affecting the WeGIA web application, a Web Manager for Institutions with a focus on the Portuguese language. The issue resides in the personalizacao_upload.php endpoint, where an authorized attacker can execute arbitrary SQL queries to access sensitive information. Published on 2025-02-20, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with network accessibility, low attack complexity, and no privileges or user interaction required.
Attackers can exploit this vulnerability remotely without authentication privileges per the CVSS vector, sending crafted inputs to the endpoint to execute arbitrary SQL commands. Successful exploitation enables high-impact outcomes, including unauthorized access to sensitive data, data modification, or denial of service through database disruption.
The vulnerability has been addressed in WeGIA version 3.2.14, and all users are advised to upgrade promptly. No workarounds are available. For full details, refer to the GitHub Security Advisory at https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j856-wh9m-9vpm.
Details
- CWE(s)