CVE-2026-40285

HIGH

WeGIA has SQL Injection via Session Variable Override in DespachoControle.php

Title source: cna
STIX 2.1

Description

WeGIA is a web manager for charitable institutions. Versions prior to 3.6.10 contain a SQL injection vulnerability in dao/memorando/UsuarioDAO.php. The cpf_usuario POST parameter overwrites the session-stored user identity via extract($_REQUEST) in DespachoControle::verificarDespacho(), and the attacker-controlled value is then interpolated directly into a raw SQL query, allowing any authenticated user to query the database under an arbitrary identity. Version 3.6.10 fixes the issue.

Scores

CVSS v3 8.8
EPSS 0.0004
EPSS Percentile 11.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-302 CWE-473 CWE-89
Status published
Products (1)
LabRedesCefetRJ/WeGIA < 3.6.10
Published Apr 17, 2026
Tracked Since Apr 18, 2026