WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the file html/socio/sistema/deletar_tag.php uses extract($_REQUEST) on line 14 and directly concatenates the $id_tag variable into SQL queries on lines 16-17 without prepared statements or sanitization. Version 3.6.7 patches the vulnerability.