CVE-2025-50201 PUBLISHED

WeGIA OS Command Injection in debug_info.php parameter 'branch'

Assigner: GitHub_M
Reserved: 13.06.2025 Published: 19.06.2025 Updated: 23.06.2025

WeGIA is a web manager for charitable institutions. Prior to version 3.4.2, an OS Command Injection vulnerability was identified in the /html/configuracao/debug_info.php endpoint. The branch parameter is not properly sanitized before being concatenated and executed in a shell command on the server's operating system. This flaw allows an unauthenticated attacker to execute arbitrary commands on the server with the privileges of the web server user (www-data). This issue has been patched in version 3.4.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor LabRedesCefetRJ
Product WeGIA
Versions
  • Version < 3.4.2 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE