Description
WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, a critical Remote Code Execution (RCE) vulnerability exists in the WeGIA application's database restoration functionality. An attacker with administrative access (which can be obtained via the previously reported Authentication Bypass) can execute arbitrary OS commands on the server by uploading a backup file with a specifically crafted filename. Version 3.6.5 fixes the issue.
Exploits (1)
github
STUB
1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2026-28409
Scores
CVSS v3
10.0
EPSS
0.0030
EPSS Percentile
52.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Lab Environment
patched
vulnerable
docker pull ghcr.io/exploitintel/cve-2026-28409-vulnerable:latest
Classification
CWE
CWE-78
Status
published
Affected Products (1)
wegia/wegia
< 3.6.5
Timeline
Published
Feb 27, 2026
Tracked Since
Feb 28, 2026