CVE-2026-28409: WeGIA RCE — Critical — Patch Now
CVE-2026-28409
Patch now! CVE-2026-28409 is a critical RCE in WeGIA <3.6.5 that lets an authenticated attacker execute OS commands via a malicious backup filename. Upgrade to 3.6.5 to block exploitation from authentication bypass chain.
Patch now - CVE-2026-28409 is a critical remote code execution in WeGIA versions prior to 3.6.5 that grants authenticated attackers full server control by uploading a malicious backup file. Upgrade immediately to version 3.6.5 to block exploitation chains that start with authentication bypass.
Overview
A critical security vulnerability has been identified in the WeGIA web management software for charitable institutions. This flaw allows an authenticated attacker to execute arbitrary operating system commands on the server hosting the application, potentially leading to a complete system compromise.
Vulnerability Details
The vulnerability resides in the database restoration feature of WeGIA. In versions prior to 3.6.5, the application does not properly validate or sanitize the filename of uploaded backup files. An attacker with administrative access can upload a specially crafted backup file. When the server processes this file, the malicious filename can trigger the execution of operating system commands.
Important Context: Administrative access, required to exploit this flaw, can be obtained by chaining this vulnerability with a previously disclosed Authentication Bypass vulnerability in WeGIA (CVE-2026-28408). This significantly lowers the barrier for attack.
Potential Impact
The impact of this vulnerability is severe (CVSS Score: 10.0). A successful exploit could allow an attacker to:
- Gain full control of the underlying server.
- Steal, modify, or delete sensitive donor, beneficiary, and financial data.
- Install persistent malware or ransomware.
- Use the compromised server as a launch point for attacks on other internal network systems.
- Deface or permanently disable the WeGIA application.
Remediation and Mitigation
Immediate action is required for all organizations using WeGIA.
Primary Remediation: The only complete solution is to upgrade the WeGIA application to version 3.6.5 or later, which contains the fix for this vulnerability. Download the patched version only from the official WeGIA project source.
Immediate Mitigation Steps (If Upgrade is Delayed):
- Restrict Access: Immediately review and restrict network access to the WeGIA administrative interface. Implement IP allow-listing if possible to limit access to trusted administrative networks only.
- Audit User Accounts: Review all administrative user accounts for unauthorized access or creation. Ensure all accounts use strong, unique passwords.
- Disable Feature: If the database restoration feature is not essential for daily operations, consider disabling it via application configuration or server-side file permissions until the upgrade can be performed.
- Monitor Logs: Closely monitor server access logs, application logs, and system logs for any unusual file upload activity or unexpected process execution.
All users of WeGIA should also ensure they have applied patches for the related Authentication Bypass vulnerability to prevent attackers from easily gaining the administrative access needed to exploit this flaw.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
WeGIA is a web manager for charitable institutions. Versions 3.6.5 and below contain an authenticated SQL Injection vulnerability in the html/matPat/restaurar_produto.php endpoint. The vulnerability a...
WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbit...
WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the listar_memorandos_ativos.php endpoint. An attacker can inj...
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, all Docker container management endpoints in Termix interpolate th...
Other Wegia Wegia Vulnerabilities
WeGIA is a web manager for charitable institutions. Versions 3.6.5 and below contain an authenticated SQL Injection vulnerability in the html/matPat/restaurar_produto.php endpoint. The vulnerability a...
WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbit...
WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the listar_memorandos_ativos.php endpoint. An attacker can inj...