WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the file `html/socio/sistema/deletar_tag.php` uses `extract($_REQUEST)` on line 14 and directly concatenates the `$id_tag` variable into SQL queries on lines 16-17 without prepared statements or sanitization. Version 3.6.7 patches the vulnerability.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labredescefetrj
Labredescefetrj wegia |
|
| Vendors & Products |
Labredescefetrj
Labredescefetrj wegia |
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the file `html/socio/sistema/deletar_tag.php` uses `extract($_REQUEST)` on line 14 and directly concatenates the `$id_tag` variable into SQL queries on lines 16-17 without prepared statements or sanitization. Version 3.6.7 patches the vulnerability. | |
| Title | WeGIA has SQL Injection in deletar_tag.php | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T22:10:51.350Z
Reserved: 2026-03-24T22:20:06.211Z
Link: CVE-2026-33991
No data.
Status : Awaiting Analysis
Published: 2026-03-27T23:17:13.913
Modified: 2026-03-30T13:26:07.647
Link: CVE-2026-33991
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:59:56Z
Weaknesses