CVE-2026-33134
WeGIA is a web manager for charitable institutions. Versions 3.6.5 and below contain an authenticated SQL Injection vulnerability in the html/matPat/restaurarproduto.php endpoint. The vulnerability allows an authenticated attacker to inject arbitrary SQL commands via the idproduto GET parameter, leading to full database compromise. In the script /html/matPat/restaurarproduto.php, the application retrieves the idproduto parameter directly from the $_GET global array and interpolates it directly into two SQL query strings without any sanitization, type-casting (e.g., (int)), or using parameterized (prepare/execute) statements. This issue has been fixed in version 3.6.6.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.6, https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33134.json, https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qg95-x997-66wq, https://nvd.nist.gov/vuln/detail/CVE-2026-33134, https://github.com/LabRedesCefetRJ/WeGIA/pull/1457
