Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 11 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in html/matPat/restaurar_produto.php. The id_produto parameter from $_GET is directly interpolated into SQL queries without parameterization or sanitization. This vulnerability is fixed in 3.6.6. | |
| Title | WeGIA has a SQL Injection via Direct Query Interpolation in restaurar_produto.php | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-11T20:27:50.897Z
Reserved: 2026-03-09T21:59:02.688Z
Link: CVE-2026-31895
Updated: 2026-03-11T20:27:46.042Z
Status : Received
Published: 2026-03-11T20:16:15.633
Modified: 2026-03-11T20:16:15.633
Link: CVE-2026-31895
No data.
OpenCVE Enrichment
No data.