CVE-2026-23723

WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an authenticated SQL Injection vulnerability was identified in the Atendido_ocorrenciaControle endpoint via the id_memorando parameter. This flaw allows for full database exfiltration, exposure of sensitive PII, and potential arbitrary file reads in misconfigured environments. This vulnerability is fixed in 3.6.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*

History

30 Jan 2026, 18:28

Type Values Removed Values Added
References () https://github.com/LabRedesCefetRJ/WeGIA/pull/1333 - () https://github.com/LabRedesCefetRJ/WeGIA/pull/1333 - Issue Tracking, Patch
References () https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2 - () https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2 - Release Notes
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjp - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjp - Exploit, Vendor Advisory
CPE cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
First Time Wegia wegia
Wegia

16 Jan 2026, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-16 20:15

Updated : 2026-01-30 18:28


NVD link : CVE-2026-23723

Mitre link : CVE-2026-23723

CVE.ORG link : CVE-2026-23723


JSON object : View

Products Affected

wegia

  • wegia
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')