Description
WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract($_REQUEST) to populate local variables and then directly concatenates these variables into a SQL query executed via PDO::query. This allows an authenticated (or auth-bypassed) attacker to execute arbitrary SQL commands. This can be used to exfiltrate sensitive data from the database or, as demonstrated in this PoC, cause a time-based delay (denial of service). This vulnerability is fixed in 3.6.6.
Published: 2026-03-11
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

WeGIA’s remover_produto_ocultar.php uses PHP’s extract() to copy all request variables into local scope and then concatenates those variables directly into a SQL query executed via PDO::query. This flaw allows an authenticated or authentication‑bypassed attacker to inject arbitrary SQL commands. The result is a full SQL injection vulnerability that can be used to exfiltrate sensitive data from the database or, as demonstrated in the PoC, to cause a time‑based delay that can be leveraged for denial‑of‑service. The vulnerability is classified as CWE‑89 and carries a CVSS score of 9.8.

Affected Systems

The affected product is LabRedesCefetRJ’s WeGIA application. All installations of version 3.6.5 and earlier are vulnerable; the issue is fixed in version 3.6.6 and beyond. The affected component is identified by the CPE string cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score indicates a very high severity, while the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Because the flaw requires the attacker to supply request parameters, it is likely exploitable via authenticated or auth‑bypassed access, though the time‑based denial‑of‑service technique could potentially be triggered remotely depending on the server configuration. Overall, the risk remains high due to the severity and the ease with which an attacker who can supply input can exploit the issue.

Generated by OpenCVE AI on March 17, 2026 at 15:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WeGIA to version 3.6.6 or later to eliminate the SQL injection flaw.
  • If an immediate upgrade is not possible, restrict access to remover_produto_ocultar.php to authorized administrators only and monitor for unusual activity.
  • Implement input validation and sanitization for all user‑supplied data, and transition to prepared statements or ORM frameworks to avoid direct string concatenation in SQL queries.

Generated by OpenCVE AI on March 17, 2026 at 15:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Wegia
Wegia wegia
CPEs cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
Vendors & Products Wegia
Wegia wegia

Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Labredescefetrj
Labredescefetrj wegia
Vendors & Products Labredescefetrj
Labredescefetrj wegia

Wed, 11 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract($_REQUEST) to populate local variables and then directly concatenates these variables into a SQL query executed via PDO::query. This allows an authenticated (or auth-bypassed) attacker to execute arbitrary SQL commands. This can be used to exfiltrate sensitive data from the database or, as demonstrated in this PoC, cause a time-based delay (denial of service). This vulnerability is fixed in 3.6.6.
Title WeGIA has a Time-Based Blind SQL Injection in remover_produto_ocultar.php
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Labredescefetrj Wegia
Wegia Wegia
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T20:03:11.859Z

Reserved: 2026-03-09T21:59:02.688Z

Link: CVE-2026-31896

cve-icon Vulnrichment

Updated: 2026-03-12T20:03:09.400Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T20:16:15.797

Modified: 2026-03-13T20:05:49.723

Link: CVE-2026-31896

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:29:22Z

Weaknesses