CVE-2026-28411

WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, an unsafe use of the `extract()` function on the `$_REQUEST` superglobal allows an unauthenticated attacker to overwrite local variables in multiple PHP scripts. This vulnerability can be leveraged to completely bypass authentication checks, allowing unauthorized access to administrative and protected areas of the WeGIA application. Version 3.6.5 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*

History

03 Mar 2026, 17:56

Type Values Removed Values Added
CPE cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
First Time Wegia wegia
Wegia
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g7r9-hxc8-8vh7 - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g7r9-hxc8-8vh7 - Exploit, Vendor Advisory

27 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 22:16

Updated : 2026-03-03 17:56


NVD link : CVE-2026-28411

Mitre link : CVE-2026-28411

CVE.ORG link : CVE-2026-28411


JSON object : View

Products Affected

wegia

  • wegia
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel

CWE-473

PHP External Variable Modification