Unrated severityNVD Advisory· Published Mar 20, 2026· Updated Mar 24, 2026
WeGIA has an arbitrary SQL execution vulnerability via crafted backup archive
CVE-2026-33133
Description
WeGIA is a web manager for charitable institutions. In versions 3.6.5 and 3.6.6, the loadBackupDB() function imports SQL files from uploaded backup archives without any content validation. An attacker can craft a backup archive containing arbitrary SQL statements that create rogue administrator accounts, modify existing passwords, or execute any database operation. This was introduced in commit 370104c. This issue was patched in version 3.6.7.
Affected products
1- Range: >= 3.6.5, < 3.6.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/LabRedesCefetRJ/WeGIA/pull/1459mitrex_refsource_MISC
- github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7mitrex_refsource_MISC
- github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qqff-p8fc-hg5fmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.