WeGIA is a web manager for charitable institutions. Prior to version 3.4.2, an OS Command Injection vulnerability was identified in the /html/configuracao/debug_info.php endpoint. The branch parameter is not properly sanitized before being concatenated and executed in a shell command on the server's operating system. This flaw allows an unauthenticated attacker to execute arbitrary commands on the server with the privileges of the web server user (www-data). This issue has been patched in version 3.4.2.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Jun 2025 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is a web manager for charitable institutions. Prior to version 3.4.2, an OS Command Injection vulnerability was identified in the /html/configuracao/debug_info.php endpoint. The branch parameter is not properly sanitized before being concatenated and executed in a shell command on the server's operating system. This flaw allows an unauthenticated attacker to execute arbitrary commands on the server with the privileges of the web server user (www-data). This issue has been patched in version 3.4.2. | |
Title | WeGIA OS Command Injection in debug_info.php parameter 'branch' | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-19T03:34:29.859Z
Updated: 2025-06-19T03:34:29.859Z
Reserved: 2025-06-13T19:17:51.728Z
Link: CVE-2025-50201

No data.

Status : Received
Published: 2025-06-19T04:15:49.340
Modified: 2025-06-19T04:15:49.340
Link: CVE-2025-50201

No data.