WeGIA is a web manager for charitable institutions. In 3.6.5, The patched loadBackupDB() extracts tar.gz archives to a temporary directory using PHP's PharData class, then uses glob() and file_get_contents() to read SQL files from the extracted contents. Neither the extraction nor the file reading validates whether archive members are symbolic links. This vulnerability is fixed in 3.6.6.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/commit/79e7a164eddb527e3b331037b7a4defb8c115d50 | Patch |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6mmm-27h8-8g55 | Exploit Vendor Advisory Mitigation |
Configurations
History
No history.
Information
Published : 2026-03-11 20:16
Updated : 2026-03-13 20:22
NVD link : CVE-2026-31894
Mitre link : CVE-2026-31894
CVE.ORG link : CVE-2026-31894
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
