Description
WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_REQUEST without validation and directly interpolated into SQL queries, allowing any authenticated user to execute arbitrary SQL commands against the database. This vulnerability is fixed in 3.6.9.
Published: 2026-04-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Immediate Patch
AI Analysis

Impact

WeGIA is a web manager for charitable institutions. The vulnerability is a classic SQL injection in DespachoDAO.php where the id_memorando parameter is extracted from the request without validation and concatenated directly into SQL statements. This flaw allows any authenticated user to execute arbitrary SQL commands, giving the attacker the ability to read, modify, or delete database contents and potentially expose sensitive information or compromise application integrity.

Affected Systems

Any installation of WeGIA by LabRedesCefetRJ running a version older than 3.6.9 is affected. The flaw is present in DespachoDAO, which processes memorandum IDs accessed through the web interface. Only authenticated users can reach the vulnerable endpoint; no other versions or components are known to be impacted.

Risk and Exploitability

The CVSS score of 8.8 denotes high severity, while the EPSS score of less than 1 % indicates a low near‑term exploitation likelihood and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated session and a crafted id_memorando value, enabling the attacker to inject SQL statements that run with the application’s database privileges. This can result in unrestricted database access, data theft, or manipulation of records.

Generated by OpenCVE AI on April 9, 2026 at 18:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WeGIA to version 3.6.9 or later.
  • If a patch cannot be applied immediately, restrict access to the affected endpoint to trusted roles and replace the direct SQL concatenation with a validated or parameterized query for id_memorando.
  • Verify with LabRedesCefetRJ that all future updates fix the issue and monitor for additional security advisories.

Generated by OpenCVE AI on April 9, 2026 at 18:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Wegia
Wegia wegia
CPEs cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
Vendors & Products Wegia
Wegia wegia

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Labredescefetrj
Labredescefetrj wegia
Vendors & Products Labredescefetrj
Labredescefetrj wegia

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_REQUEST without validation and directly interpolated into SQL queries, allowing any authenticated user to execute arbitrary SQL commands against the database. This vulnerability is fixed in 3.6.9.
Title WeGIA has a SQL Injection in DespachoDAO.php via id_memorando parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Labredescefetrj Wegia
Wegia Wegia
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T13:45:12.996Z

Reserved: 2026-04-02T17:03:42.074Z

Link: CVE-2026-35395

cve-icon Vulnrichment

Updated: 2026-04-07T13:45:01.790Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T21:16:21.450

Modified: 2026-04-09T17:40:26.883

Link: CVE-2026-35395

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:00Z

Weaknesses