Critical (9.3)

PHP SQL Injection (CVE-2026-33134)

CVE-2026-33134

WeGIA is a web manager for charitable institutions. Versions 3.6.5 and below contain an authenticated SQL Injection vulnerability in the html/matPat/restaurar_produto.php endpoint. The vulnerability a...

Affected: Wegia Wegia

Overview

A critical security vulnerability, tracked as CVE-2026-33134, has been identified in the WeGIA web management platform for charitable institutions. This flaw is an Authenticated SQL Injection that could allow an attacker with valid login credentials to execute malicious commands on the underlying database.

Vulnerability Details

The vulnerability exists in the html/matPat/restaurar_produto.php endpoint of WeGIA. In affected versions (3.6.5 and below), the application fails to properly validate or sanitize user input. Specifically, it takes the id_produto parameter directly from a web request and inserts it directly into SQL query strings without any safety checks.

This insecure coding practice creates an opening where an attacker can craft special inputs that alter the intended SQL commands. Because the attacker must be authenticated, this vulnerability primarily threatens the integrity of the system from within, potentially by a malicious insider or an attacker who has already compromised a user account.

Impact

The impact of this vulnerability is severe (CVSS Score: 9.3). Successful exploitation grants an attacker the ability to read, modify, or delete any data within the connected database. This could include sensitive donor information, financial records, beneficiary details, and internal operational data. Such a breach could lead to significant data loss, fraud, operational disruption, and severe reputational damage for the charitable institution. For context on the real-world consequences of data exposure, you can review recent incidents in our breach reports.

Affected Versions

  • WeGIA versions 3.6.5 and all prior versions are confirmed vulnerable.

Remediation and Mitigation

The primary and most effective action is to apply the official patch immediately.

  1. Immediate Patching: Upgrade WeGIA to version 3.6.6 or later. This update contains the fix that properly secures the input, preventing SQL injection. Always obtain software updates directly from the official vendor source.

  2. Temporary Mitigation: If immediate patching is not possible, consider implementing a Web Application Firewall (WAF) with rules configured to block SQL injection patterns. This can provide a temporary layer of defense while you schedule the upgrade. Additionally, review and minimize user accounts with access to the affected module.

  3. Proactive Security: This incident underscores the importance of secure coding practices, such as using parameterized queries or prepared statements for all database interactions. Organizations should regularly audit their web applications for similar flaws. Staying informed on emerging threats is crucial; follow the latest developments in our security news section.

All organizations using WeGIA should treat this as a high-priority issue and update their systems without delay to protect their sensitive charitable operations and data.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Wegia Wegia Vulnerabilities

View all Wegia Wegia vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.