CVE-2026-40285
HIGHWeGIA has SQL Injection via Session Variable Override in DespachoControle.php
Title source: cnaDescription
WeGIA is a web manager for charitable institutions. Versions prior to 3.6.10 contain a SQL injection vulnerability in dao/memorando/UsuarioDAO.php. The cpf_usuario POST parameter overwrites the session-stored user identity via extract($_REQUEST) in DespachoControle::verificarDespacho(), and the attacker-controlled value is then interpolated directly into a raw SQL query, allowing any authenticated user to query the database under an arbitrary identity. Version 3.6.10 fixes the issue.
Scores
CVSS v3
8.8
EPSS
0.0004
EPSS Percentile
11.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-302
CWE-473
CWE-89
Status
published
Products (1)
LabRedesCefetRJ/WeGIA
< 3.6.10
Published
Apr 17, 2026
Tracked Since
Apr 18, 2026