WeGIA is a web manager for charitable institutions. In versions 3.6.5 and 3.6.6, the loadBackupDB() function imports SQL files from uploaded backup archives without any content validation. An attacker can craft a backup archive containing arbitrary SQL statements that create rogue administrator accounts, modify existing passwords, or execute any database operation. This was introduced in commit 370104c. This issue was patched in version 3.6.7.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/pull/1459 | Issue Tracking Patch |
| https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7 | Product Release Notes |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qqff-p8fc-hg5f | Exploit Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-20 11:18
Updated : 2026-03-20 19:29
NVD link : CVE-2026-33133
Mitre link : CVE-2026-33133
CVE.ORG link : CVE-2026-33133
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
