Security Vulnerabilities
- CVEs Published In February 2025
Seacms <=13.3 is vulnerable to SQL Injection in admin_members.php.
WeGIA is a Web manager for charitable institutions. An OS Command Injection vulnerability was discovered in versions prior to 3.2.15 of the WeGIA application, `importar_dump.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. The command is basically a command to move a temporary file, so a webshell upload is also possible. Version 3.2.15 contains a patch for the issue.
An SQL injection risk was identified in the module list filter within course search.
Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.
Insufficient sanitizing in the TeX notation filter resulted in an
arbitrary file read risk on sites where pdfTeX is available (such as
those with TeX Live installed).
Separate Groups mode restrictions were not factored into permission
checks before allowing viewing or deletion of responses in Feedback
activities.
Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.
The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.
Description information displayed in the site administration live log
required additional sanitizing to prevent a stored XSS risk.
The question bank filter required additional sanitizing to prevent a reflected XSS risk.