WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. An OS Command Injection vulnerability was discovered in the WeGIA application, `gerenciar_backup.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g3w6-m6w8-p6r2 | Exploit Vendor Advisory |
Configurations
History
28 Feb 2025, 19:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
First Time |
Wegia
Wegia wegia |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g3w6-m6w8-p6r2 - Exploit, Vendor Advisory |
18 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-18 21:15
Updated : 2025-02-28 19:18
NVD link : CVE-2025-26613
Mitre link : CVE-2025-26613
CVE.ORG link : CVE-2025-26613
JSON object : View
Products Affected
wegia
- wegia