{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33133","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-17T20:35:49.928Z","datePublished":"2026-03-20T10:31:38.420Z","dateUpdated":"2026-03-24T01:59:18.010Z"},"containers":{"cna":{"title":"WeGIA has an arbitrary SQL execution vulnerability via crafted backup archive","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qqff-p8fc-hg5f","tags":["x_refsource_CONFIRM"],"url":"https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qqff-p8fc-hg5f"},{"name":"https://github.com/LabRedesCefetRJ/WeGIA/pull/1459","tags":["x_refsource_MISC"],"url":"https://github.com/LabRedesCefetRJ/WeGIA/pull/1459"},{"name":"https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7","tags":["x_refsource_MISC"],"url":"https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7"}],"affected":[{"vendor":"LabRedesCefetRJ","product":"WeGIA","versions":[{"version":">= 3.6.5, < 3.6.7","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-20T10:31:38.420Z"},"descriptions":[{"lang":"en","value":"WeGIA is a web manager for charitable institutions. In versions 3.6.5 and 3.6.6, the loadBackupDB() function imports SQL files from uploaded backup archives without any content validation. An attacker can craft a backup archive containing arbitrary SQL statements that create rogue administrator accounts, modify existing passwords, or execute any database operation. This was introduced in commit 370104c. This issue was patched in version 3.6.7."}],"source":{"advisory":"GHSA-qqff-p8fc-hg5f","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-24T01:58:24.766105Z","id":"CVE-2026-33133","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T01:59:18.010Z"}}]}}