Vulnerability Description
WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an authenticated SQL Injection vulnerability was identified in the Atendido_ocorrenciaControle endpoint via the id_memorando parameter. This flaw allows for full database exfiltration, exposure of sensitive PII, and potential arbitrary file reads in misconfigured environments. This vulnerability is fixed in 3.6.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wegia | Wegia | < 3.6.2 |
Related Weaknesses (CWE)
References
- https://github.com/LabRedesCefetRJ/WeGIA/pull/1333Issue TrackingPatch
- https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2Release Notes
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjpExploitVendor Advisory
FAQ
What is CVE-2026-23723?
CVE-2026-23723 is a vulnerability with a CVSS score of 7.2 (HIGH). WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an authenticated SQL Injection vulnerability was identified in the Atendido_ocorrenciaControle endpoint via the id_memorando paramet...
How severe is CVE-2026-23723?
CVE-2026-23723 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23723?
Check the references section above for vendor advisories and patch information. Affected products include: Wegia Wegia.