<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Wegia — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/wegia/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/wegia/feed.xml" rel="self" type="application/rss+xml"/><item><title>WeGIA SQL Injection Vulnerability (CVE-2026-40285)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wegia-sqli/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wegia-sqli/</guid><description>WeGIA versions prior to 3.6.10 are vulnerable to SQL injection via the cpf_usuario POST parameter, allowing authenticated users to query the database under an arbitrary identity.</description><content:encoded><![CDATA[<p>WeGIA, a web manager for charitable institutions, is susceptible to a SQL injection vulnerability affecting versions prior to 3.6.10. This flaw, identified as CVE-2026-40285, resides in the <code>dao/memorando/UsuarioDAO.php</code> file. The vulnerability stems from the insecure handling of the <code>cpf_usuario</code> POST parameter within the <code>DespachoControle::verificarDespacho()</code> function, where the <code>extract($_REQUEST)</code> function overwrites the session-stored user identity. An attacker can then manipulate the <code>cpf_usuario</code> value, which is subsequently interpolated directly into a raw SQL query. This allows an authenticated user to execute arbitrary SQL queries with the privileges of an arbitrary user, potentially gaining unauthorized access to sensitive data. WeGIA version 3.6.10 addresses and resolves this critical vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WeGIA web application.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the endpoint associated with <code>DespachoControle::verificarDespacho()</code>.</li>
<li>The crafted POST request includes the <code>cpf_usuario</code> parameter with a SQL injection payload.</li>
<li>The <code>extract($_REQUEST)</code> function processes the POST data, overwriting the legitimate session-stored user identity with the attacker-controlled <code>cpf_usuario</code> value.</li>
<li>The application constructs a raw SQL query, directly interpolating the malicious <code>cpf_usuario</code> value into the query string without proper sanitization.</li>
<li>The database executes the crafted SQL query, effectively querying the database as an arbitrary user specified by the attacker in the <code>cpf_usuario</code> parameter.</li>
<li>The application returns the results of the injected SQL query to the attacker, potentially revealing sensitive information.</li>
<li>The attacker can leverage the SQL injection to perform unauthorized data retrieval, modification, or deletion within the WeGIA application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-40285) allows attackers to bypass authentication and access sensitive data within the WeGIA application. This could lead to the compromise of user accounts, financial records, or other confidential information managed by charitable institutions using WeGIA. The impact could range from data breaches and financial losses to reputational damage and legal repercussions for the affected organizations. The CVSS v3.1 base score of 8.8 indicates a high level of severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WeGIA installations to version 3.6.10 or later to remediate CVE-2026-40285.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts by monitoring for POST requests containing potentially malicious SQL injection payloads in the <code>cpf_usuario</code> parameter.</li>
<li>Implement input validation and sanitization measures for all user-supplied data, especially within the <code>DespachoControle::verificarDespacho()</code> function to prevent future SQL injection vulnerabilities.</li>
<li>Review web server logs for suspicious POST requests targeting WeGIA endpoints to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wegia</category><category>sql-injection</category><category>cve-2026-40285</category><category>web-application</category></item></channel></rss>