CVE-2025-30364

Source
https://cve.org/CVERecord?id=CVE-2025-30364
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-30364.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-30364
Aliases
  • GHSA-x3ff-5qp7-43qv
Published
2025-03-27T16:27:26.630Z
Modified
2026-04-10T05:24:46.473956Z
Severity
  • 10.0 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
WeGIA vulnerable to SQL Injection (Blind Time-Based) in remuneracao.php parameter id_funcionario
Details

WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.2.8 in the endpoint /WeGIA/html/funcionario/remuneracao.php, in the id_funcionario parameter. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data. Version 3.2.8 fixes the issue.

Database specific
{
    "cwe_ids": [
        "CWE-89"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/30xxx/CVE-2025-30364.json"
}
References

Affected packages

Git / github.com/labredescefetrj/wegia

Affected ranges

Type
GIT
Repo
https://github.com/labredescefetrj/wegia
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.9.4-beta
v1.*
v1.0
v2.*
v2.0
v2.0-beta
v3.*
v3.1
v3.2.0
v3.2.6
v3.2.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-30364.json"