CVE-2026-31894

WeGIA is a web manager for charitable institutions. In 3.6.5, The patched loadBackupDB() extracts tar.gz archives to a temporary directory using PHP's PharData class, then uses glob() and file_get_contents() to read SQL files from the extracted contents. Neither the extraction nor the file reading validates whether archive members are symbolic links. This vulnerability is fixed in 3.6.6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wegia:wegia:3.6.5:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-11 20:16

Updated : 2026-03-13 20:22


NVD link : CVE-2026-31894

Mitre link : CVE-2026-31894

CVE.ORG link : CVE-2026-31894


JSON object : View

Products Affected

wegia

  • wegia
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')