WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-35395)
WeGIA web manager versions prior to 3.6.9 are vulnerable to SQL injection, allowing authenticated users to execute arbitrary SQL commands by directly interpolating the id_memorando parameter from $_REQUEST into SQL queries without validation, as identified by CVE-2026-35395.
WeGIA (Web gerenciador para instituições assistenciais) is a web manager for charitable institutions. Versions prior to 3.6.9 are susceptible to a critical SQL injection vulnerability (CVE-2026-35395) found in the dao/memorando/DespachoDAO.php file. The id_memorando parameter, extracted from the $_REQUEST array, is directly incorporated into SQL queries without any validation or sanitization. This flaw enables authenticated users with low privileges to inject arbitrary SQL commands, potentially leading to complete database compromise. Successful exploitation could result in data breaches, modification of sensitive information, and denial-of-service conditions. Defenders should prioritize upgrading to version 3.6.9 or applying provided patches immediately.
Attack Chain
- An authenticated user logs into the WeGIA web application.
- The user navigates to a page that triggers the execution of
dao/memorando/DespachoDAO.php. - The application extracts the
id_memorandoparameter from the$_REQUESTarray using the HTTP GET or POST method. - The attacker crafts a malicious
id_memorandoparameter containing SQL injection payloads (e.g.,1; DROP TABLE users; --). - The application directly interpolates the attacker-controlled
id_memorandoparameter into an SQL query without proper sanitization within theDespachoDAO.phpfile. - The database server executes the injected SQL command, allowing the attacker to manipulate database records, read sensitive data, or execute arbitrary commands.
- The attacker may exfiltrate sensitive data from the database, such as user credentials, financial information, or confidential memorandums.
- The attacker achieves complete database compromise, potentially leading to a full system takeover.
Impact
The SQL injection vulnerability in WeGIA versions prior to 3.6.9 poses a significant risk to charitable institutions using the software. Successful exploitation can lead to unauthorized access to sensitive donor information, financial records, and confidential communications. The potential impact includes data breaches, financial losses, reputational damage, and legal liabilities. Given the nature of the targeted institutions, this vulnerability could severely disrupt their operations and erode public trust, potentially affecting thousands of individuals. Organizations that do not apply the patch are vulnerable to data breaches.
Recommendation
- Immediately upgrade WeGIA to version 3.6.9 to remediate the SQL injection vulnerability described in CVE-2026-35395.
- Implement input validation and sanitization for all user-supplied data, especially the
id_memorandoparameter inDespachoDAO.php, to prevent future SQL injection attacks. - Deploy the Sigma rule “Detect Suspicious WeGIA SQL Injection Attempts” to your SIEM and tune it for your environment to detect exploitation attempts.
- Monitor web server logs for suspicious requests containing SQL injection payloads targeting the
dao/memorando/DespachoDAO.phpendpoint. - Restrict database access privileges to the minimum required for WeGIA to function correctly.
Detection coverage 2
Detect Suspicious WeGIA SQL Injection Attempts
criticalDetects potential SQL injection attempts in WeGIA web application by monitoring for suspicious characters and keywords in the id_memorando parameter.
Detect WeGIA DespachoDAO.php Access with Potential SQL Injection
highDetects access to DespachoDAO.php with potentially malicious SQL injection attempts.
Detection queries are kept inside the platform. Get full rules →