Unrated severityOSV Advisory· Published Jan 16, 2026· Updated Jan 16, 2026
WeGIA has a Critical SQL Injection in Atendido_ocorrenciaControle via id_memorando parameter
CVE-2026-23723
Description
WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an authenticated SQL Injection vulnerability was identified in the Atendido_ocorrenciaControle endpoint via the id_memorando parameter. This flaw allows for full database exfiltration, exposure of sensitive PII, and potential arbitrary file reads in misconfigured environments. This vulnerability is fixed in 3.6.2.
Affected products
1- Range: 0.9.4-beta, 3.3.0, 3.3.1, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/LabRedesCefetRJ/WeGIA/pull/1333mitrex_refsource_MISC
- github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2mitrex_refsource_MISC
- github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjpmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.