CVE-2026-28409

WeGIA · WeGIA Web Manager

A critical RCE vulnerability in WeGIA's database restoration allows administrative users to execute arbitrary OS commands via crafted filenames in backup uploads.

Executive summary

A critical remote code execution vulnerability in WeGIA allows administrative users to achieve full system compromise by uploading malicious backup files.

Vulnerability

This vulnerability involves an arbitrary OS command injection within the database restoration functionality. While it requires administrative-level authentication, the risk is compounded by the existence of known authentication bypasses that can grant an attacker the necessary privileges to exploit this flaw.

Business impact

Successful exploitation allows for complete control over the underlying server, potentially leading to the theft of sensitive charitable organization data, total service disruption, and permanent loss of database integrity. The CVSS score of 10.0 reflects the maximum possible severity, indicating that the integrity, availability, and confidentiality of the entire system are at extreme risk.

Remediation

Immediate Action: Update the WeGIA application to version 3.6.5 or later immediately to patch the vulnerable database restoration logic.

Proactive Monitoring: Review system logs for unusual OS command execution originating from the web server user and monitor file upload directories for suspicious filenames.

Compensating Controls: Restrict access to the administrative interface to trusted IP addresses only and implement a Web Application Firewall (WAF) to detect command injection patterns.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The CVSS 10.0 rating necessitates immediate intervention. IT administrators must prioritize the update to version 3.6.5, as this vulnerability provides a direct path to full server takeover once administrative access is obtained.