CVE-2026-23723

7.2 HIGH

📋 TL;DR

An authenticated SQL injection vulnerability in WeGIA's Atendido_ocorrenciaControle endpoint allows attackers to extract sensitive data from the database. This affects all WeGIA installations prior to version 3.6.2 where users have authenticated access to the vulnerable endpoint.

💻 Affected Systems

Products:
  • WeGIA
Versions: All versions prior to 3.6.2
Operating Systems: All platforms running WeGIA
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the vulnerable endpoint. Affects all deployments using default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database exfiltration including sensitive PII, potential arbitrary file reads leading to complete system compromise, and possible remote code execution in misconfigured environments.

🟠

Likely Case

Unauthorized access to sensitive personal data stored in the database, including donor information, beneficiary records, and internal operational data.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses standard SQL injection techniques. The vulnerability is well-documented in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.2

Vendor Advisory: https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjp

Restart Required: Yes

Instructions:

1. Backup your current WeGIA installation and database. 2. Download WeGIA version 3.6.2 from the official repository. 3. Replace the existing installation with the patched version. 4. Restart the web server service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject malicious input in the id_memorando parameter

# Add validation in the endpoint handler to ensure id_memorando contains only numeric values

WAF Rule

all

Deploy web application firewall rules to block SQL injection patterns

# Configure WAF to detect and block SQL injection attempts in POST parameters

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for the vulnerable endpoint
  • Restrict access to the Atendido_ocorrenciaControle endpoint to only authorized administrative users

🔍 How to Verify

Check if Vulnerable:

Check if your WeGIA version is below 3.6.2 and review the endpoint code for lack of parameterized queries in id_memorando handling.

Check Version:

Check the WeGIA version in the admin panel or review the application's version file

Verify Fix Applied:

Verify that version 3.6.2 is installed and test the Atendido_ocorrenciaControle endpoint with SQL injection payloads to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from web application logs
  • Multiple failed authentication attempts followed by SQL error messages
  • Suspicious parameter values containing SQL keywords in access logs

Network Indicators:

  • Unusual database connection patterns from web server
  • Large data transfers from database to unexpected sources

SIEM Query:

source="web_logs" AND ("id_memorando" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "UPDATE" OR "--" OR "' OR"))

🔗 References

📤 Share & Export