CVE-2026-33133
HIGHWeGIA has an arbitrary SQL execution vulnerability via crafted backup archive
Title source: cnaDescription
WeGIA is a web manager for charitable institutions. In versions 3.6.5 and 3.6.6, the loadBackupDB() function imports SQL files from uploaded backup archives without any content validation. An attacker can craft a backup archive containing arbitrary SQL statements that create rogue administrator accounts, modify existing passwords, or execute any database operation. This was introduced in commit 370104c. This issue was patched in version 3.6.7.
References (3)
Core 3
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qqff-p8fc-hg5f
X_Refsource_Misc x_refsource_misc
https://github.com/LabRedesCefetRJ/WeGIA/pull/1459
X_Refsource_Misc x_refsource_misc
https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7
Scores
CVSS v3
7.2
EPSS
0.0009
EPSS Percentile
26.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-89
Status
published
Products (3)
LabRedesCefetRJ/WeGIA
>= 3.6.5, < 3.6.7
wegia/wegia
3.6.5
wegia/wegia
3.6.6
Published
Mar 20, 2026
Tracked Since
Mar 20, 2026