Key Information Vulnerability Overview Vulnerability Type: SQL Injection Affected File: html/funcionario/profile_funcionario.php Parameter: id_funcionario Affected Versions Affected Versions: <= 3.4.2 Fixed Version: 3.4.3 Description Issue: The parameter is not properly sanitized or validated when used in SQL queries, allowing attackers to inject arbitrary SQL commands. Details: The application directly concatenates user-supplied input into SQL strings instead of using parameterized queries. Evidence Verification Method: Confirmed by attempting a UNION SELECT attack and triggering a “Cardinality violation: 1222” error. PoC URL: https://demo.wegia.org/html/funcionario/profile_funcionario.php?id_funcionario=1 Action: Insert SQL commands after the parameter. Impact Confidentiality: Attackers can read any data in the database, including user credentials and sensitive personal information. Integrity: Attackers can modify or delete any data in the database, leading to unauthorized data alterations or deletions. CVSS Score Severity: Critical (9.8/10) Vector: Network Complexity: Low Required Privileges: None User Interaction: None Scope: Unchanged Confidentiality Impact: High Integrity Impact: High Availability Impact: High CVE ID CVE-2025-53529 Weakness CWE-89