CVE-2025-52474: SQL Injection Vulnerability in id
Parameter on control.php
Endpoint
CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-52474
Summary
A SQL Injection vulnerability was identified in the id
parameter of the /WeGIA/controle/control.php
endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data.
Details
Vulnerable Endpoint: GET /controle/control.php?nomeClasse=MedicamentoControle&metodo=adicionarMedicamento&modulo=pet&nomeMedicamento=DApvMr&id=<PAYLOAD>&aplicacaoMedicamento=YqchRf&descricaoMedicamento=Mrnfdh HTTP/1.1
Parameter: id
PoC
Save the request in req.txt file:
|
|
Then use sqlmap:
|
|
Impact
- Unauthorized access to sensitive data: An attacker can access confidential information such as credentials, personal or financial data.
- Compromise of user accounts: Using stolen credentials, attackers can gain full access to the application and perform actions on behalf of legitimate users.
- Data exfiltration: Possibility of stealing large volumes of information by dumping entire database tables.
- Reputational damage: Exposing customer data or business information can significantly harm the organization's image.
- Execution of chain attacks: Obtained information can be used to carry out new attacks, such as targeted phishing or attacks on interconnected systems.
Reference
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rwvh-2gfh-wmcm
Finder
By: CVE-Hunters