WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, a critical Remote Code Execution (RCE) vulnerability exists in the WeGIA application's database restoration functionality. An attacker with administrative access (which can be obtained via the previously reported Authentication Bypass) can execute arbitrary OS commands on the server by uploading a backup file with a specifically crafted filename. Version 3.6.5 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5m5g-q2vv-rv3r | Exploit Vendor Advisory |
Configurations
History
03 Mar 2026, 18:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
| First Time |
Wegia wegia
Wegia |
|
| References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5m5g-q2vv-rv3r - Exploit, Vendor Advisory |
27 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 22:16
Updated : 2026-03-03 18:20
NVD link : CVE-2026-28409
Mitre link : CVE-2026-28409
CVE.ORG link : CVE-2026-28409
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
