CVE-2026-28411 PUBLISHED

WeGIA Vulnerable to Authentication Bypass via `extract($_REQUEST)`

Assigner: GitHub_M
Reserved: 27.02.2026 Published: 27.02.2026 Updated: 27.02.2026

WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, an unsafe use of the extract() function on the $_REQUEST superglobal allows an unauthenticated attacker to overwrite local variables in multiple PHP scripts. This vulnerability can be leveraged to completely bypass authentication checks, allowing unauthorized access to administrative and protected areas of the WeGIA application. Version 3.6.5 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor LabRedesCefetRJ
Product WeGIA
Versions
  • Version < 3.6.5 is affected

References

Problem Types

  • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE
  • CWE-473: PHP External Variable Modification CWE