{"id":"CVE-2025-50201","summary":"WeGIA OS Command Injection in debug_info.php parameter 'branch'","details":"WeGIA is a web manager for charitable institutions. Prior to version 3.4.2, an OS Command Injection vulnerability was identified in the /html/configuracao/debug_info.php endpoint. The branch parameter is not properly sanitized before being concatenated and executed in a shell command on the server's operating system. This flaw allows an unauthenticated attacker to execute arbitrary commands on the server with the privileges of the web server user (www-data). This issue has been patched in version 3.4.2.","aliases":["GHSA-52p5-5fmw-9hrf"],"modified":"2026-04-10T05:29:10.594582Z","published":"2025-06-19T03:34:29.859Z","database_specific":{"cwe_ids":["CWE-78"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/50xxx/CVE-2025-50201.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/50xxx/CVE-2025-50201.json"},{"type":"ADVISORY","url":"https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-52p5-5fmw-9hrf"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-50201"},{"type":"FIX","url":"https://github.com/LabRedesCefetRJ/WeGIA/commit/45f32ad1d52775fc99f3c90075c8136c6d4d1d3d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/labredescefetrj/wegia","events":[{"introduced":"0"},{"fixed":"72a6aaffa7ef97f04ddb1bae75d9f4936d24325a"}]}],"versions":["0.9.4-beta","3.3.0","3.3.1","3.3.2","3.3.3","3.4.0","3.4.1","v1.0","v2.0","v2.0-beta","v3.1","v3.2.0","v3.2.10","v3.2.11","v3.2.12","v3.2.13","v3.2.14","v3.2.15","v3.2.16","v3.2.17","v3.2.6","v3.2.7","v3.2.8","v3.2.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-50201.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}