Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wegia
Wegia wegia |
|
| CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wegia
Wegia wegia |
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labredescefetrj
Labredescefetrj wegia |
|
| Vendors & Products |
Labredescefetrj
Labredescefetrj wegia |
Wed, 11 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in html/matPat/restaurar_produto.php. The id_produto parameter from $_GET is directly interpolated into SQL queries without parameterization or sanitization. This vulnerability is fixed in 3.6.6. | |
| Title | WeGIA has a SQL Injection via Direct Query Interpolation in restaurar_produto.php | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-11T20:27:50.897Z
Reserved: 2026-03-09T21:59:02.688Z
Link: CVE-2026-31895
Updated: 2026-03-11T20:27:46.042Z
Status : Analyzed
Published: 2026-03-11T20:16:15.633
Modified: 2026-03-13T20:06:31.840
Link: CVE-2026-31895
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:29:23Z