CVE-2026-35395

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_REQUEST without validation and directly interpolated into SQL queries, allowing any authenticated user to execute arbitrary SQL commands against the database. This vulnerability is fixed in 3.6.9.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*

History

09 Apr 2026, 17:40

Type Values Removed Values Added
First Time Wegia wegia
Wegia
CPE cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43jm-pcrq-w7gv - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43jm-pcrq-w7gv - Exploit, Vendor Advisory

07 Apr 2026, 15:17

Type Values Removed Values Added
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43jm-pcrq-w7gv - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43jm-pcrq-w7gv -

06 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 21:16

Updated : 2026-04-09 17:40


NVD link : CVE-2026-35395

Mitre link : CVE-2026-35395

CVE.ORG link : CVE-2026-35395


JSON object : View

Products Affected

wegia

  • wegia
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')