Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an authenticated SQL Injection vulnerability was identified in the Atendido_ocorrenciaControle endpoint via the id_memorando parameter. This flaw allows for full database exfiltration, exposure of sensitive PII, and potential arbitrary file reads in misconfigured environments. This vulnerability is fixed in 3.6.2. | |
| Title | WeGIA has a Critical SQL Injection in Atendido_ocorrenciaControle via id_memorando parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-16T21:36:57.181Z
Reserved: 2026-01-15T15:45:01.955Z
Link: CVE-2026-23723
Updated: 2026-01-16T21:36:52.331Z
Status : Received
Published: 2026-01-16T20:15:50.163
Modified: 2026-01-16T20:15:50.163
Link: CVE-2026-23723
No data.
OpenCVE Enrichment
No data.