CVE-2026-33991

WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the file `html/socio/sistema/deletar_tag.php` uses `extract($_REQUEST)` on line 14 and directly concatenates the `$id_tag` variable into SQL queries on lines 16-17 without prepared statements or sanitization. Version 3.6.7 patches the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*

History

31 Mar 2026, 20:57

Type Values Removed Values Added
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-74xm-6wgf-x37j - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-74xm-6wgf-x37j - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
First Time Wegia wegia
Wegia

31 Mar 2026, 20:16

Type Values Removed Values Added
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-74xm-6wgf-x37j - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-74xm-6wgf-x37j -

27 Mar 2026, 23:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 23:17

Updated : 2026-03-31 20:57


NVD link : CVE-2026-33991

Mitre link : CVE-2026-33991

CVE.ORG link : CVE-2026-33991


JSON object : View

Products Affected

wegia

  • wegia
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')