{"id":"CVE-2025-23218","summary":"WeGIA has a SQL Injection endpoint 'adicionar_especie.php' parameter 'especie'","details":"WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_especie.php endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application's database, highlighting the severity of the flaw. This vulnerability is fixed in 3.2.10.","aliases":["GHSA-xhv4-88gx-hvgh"],"modified":"2026-04-10T05:22:51.221760Z","published":"2025-01-20T15:45:52.680Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/23xxx/CVE-2025-23218.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-89"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/23xxx/CVE-2025-23218.json"},{"type":"ADVISORY","url":"https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xhv4-88gx-hvgh"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-23218"},{"type":"FIX","url":"https://github.com/LabRedesCefetRJ/WeGIA/commit/7465f785651c0cff65059bba96b015ab54235de4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/labredescefetrj/wegia","events":[{"introduced":"0"},{"fixed":"ada58bdb49467df92fe61e82ef676e4a12e6c038"}]}],"versions":["0.9.4-beta","v1.0","v2.0","v2.0-beta","v3.1","v3.2.0","v3.2.6","v3.2.7","v3.2.8","v3.2.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-23218.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"}]}