<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35395 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35395/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 21:16:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35395/feed.xml" rel="self" type="application/rss+xml"/><item><title>WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-35395)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wegia-sql-injection/</link><pubDate>Mon, 06 Apr 2026 21:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wegia-sql-injection/</guid><description>WeGIA web manager versions prior to 3.6.9 are vulnerable to SQL injection, allowing authenticated users to execute arbitrary SQL commands by directly interpolating the id_memorando parameter from $_REQUEST into SQL queries without validation, as identified by CVE-2026-35395.</description><content:encoded><![CDATA[<p>WeGIA (Web gerenciador para instituições assistenciais) is a web manager for charitable institutions. Versions prior to 3.6.9 are susceptible to a critical SQL injection vulnerability (CVE-2026-35395) found in the <code>dao/memorando/DespachoDAO.php</code> file. The <code>id_memorando</code> parameter, extracted from the <code>$_REQUEST</code> array, is directly incorporated into SQL queries without any validation or sanitization. This flaw enables authenticated users with low privileges to inject arbitrary SQL commands, potentially leading to complete database compromise. Successful exploitation could result in data breaches, modification of sensitive information, and denial-of-service conditions. Defenders should prioritize upgrading to version 3.6.9 or applying provided patches immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the WeGIA web application.</li>
<li>The user navigates to a page that triggers the execution of <code>dao/memorando/DespachoDAO.php</code>.</li>
<li>The application extracts the <code>id_memorando</code> parameter from the <code>$_REQUEST</code> array using the HTTP GET or POST method.</li>
<li>The attacker crafts a malicious <code>id_memorando</code> parameter containing SQL injection payloads (e.g., <code>1; DROP TABLE users; --</code>).</li>
<li>The application directly interpolates the attacker-controlled <code>id_memorando</code> parameter into an SQL query without proper sanitization within the <code>DespachoDAO.php</code> file.</li>
<li>The database server executes the injected SQL command, allowing the attacker to manipulate database records, read sensitive data, or execute arbitrary commands.</li>
<li>The attacker may exfiltrate sensitive data from the database, such as user credentials, financial information, or confidential memorandums.</li>
<li>The attacker achieves complete database compromise, potentially leading to a full system takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The SQL injection vulnerability in WeGIA versions prior to 3.6.9 poses a significant risk to charitable institutions using the software. Successful exploitation can lead to unauthorized access to sensitive donor information, financial records, and confidential communications. The potential impact includes data breaches, financial losses, reputational damage, and legal liabilities. Given the nature of the targeted institutions, this vulnerability could severely disrupt their operations and erode public trust, potentially affecting thousands of individuals. Organizations that do not apply the patch are vulnerable to data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade WeGIA to version 3.6.9 to remediate the SQL injection vulnerability described in CVE-2026-35395.</li>
<li>Implement input validation and sanitization for all user-supplied data, especially the <code>id_memorando</code> parameter in <code>DespachoDAO.php</code>, to prevent future SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WeGIA SQL Injection Attempts&rdquo; to your SIEM and tune it for your environment to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads targeting the <code>dao/memorando/DespachoDAO.php</code> endpoint.</li>
<li>Restrict database access privileges to the minimum required for WeGIA to function correctly.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35395</category><category>sql-injection</category><category>web-application</category></item></channel></rss>