First published: Tue Feb 18 2025(Updated: )
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. An OS Command Injection vulnerability was discovered in the WeGIA application, `gerenciar_backup.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wegia Wegia | <3.2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26613 is considered a critical vulnerability due to its potential for remote code execution through OS command injection.
To remediate CVE-2025-26613, upgrade WeGIA to version 3.2.15 or later, which addresses the OS command injection flaw.
WeGIA versions up to 3.2.14 are vulnerable to CVE-2025-26613.
CVE-2025-26613 allows attackers to perform OS command injection, leading to arbitrary code execution on the server.
CVE-2025-26613 specifically affects the WeGIA application and is not reported in any other software.