WeGIA is a web manager for charitable institutions. Versions prior to 3.6.10 contain a SQL injection vulnerability in dao/memorando/UsuarioDAO.php. The cpf_usuario POST parameter overwrites the session-stored user identity via extract($_REQUEST) in DespachoControle::verificarDespacho(), and the attacker-controlled value is then interpolated directly into a raw SQL query, allowing any authenticated user to query the database under an arbitrary identity. Version 3.6.10 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labredescefetrj
Labredescefetrj wegia |
|
| Vendors & Products |
Labredescefetrj
Labredescefetrj wegia |
Fri, 17 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a web manager for charitable institutions. Versions prior to 3.6.10 contain a SQL injection vulnerability in dao/memorando/UsuarioDAO.php. The cpf_usuario POST parameter overwrites the session-stored user identity via extract($_REQUEST) in DespachoControle::verificarDespacho(), and the attacker-controlled value is then interpolated directly into a raw SQL query, allowing any authenticated user to query the database under an arbitrary identity. Version 3.6.10 fixes the issue. | |
| Title | WeGIA has SQL Injection via Session Variable Override in DespachoControle.php | |
| Weaknesses | CWE-302 CWE-473 CWE-89 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T16:21:07.084Z
Reserved: 2026-04-10T20:22:44.035Z
Link: CVE-2026-40285
Updated: 2026-04-20T16:20:56.693Z
Status : Deferred
Published: 2026-04-17T21:16:34.267
Modified: 2026-04-20T19:02:18.140
Link: CVE-2026-40285
No data.
OpenCVE Enrichment
Updated: 2026-04-18T09:15:15Z