Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28411: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LabRedesCefetRJ WeGIA

0
Critical
VulnerabilityCVE-2026-28411cvecve-2026-28411cwe-288cwe-473
Published: Fri Feb 27 2026 (02/27/2026, 21:52:05 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, an unsafe use of the `extract()` function on the `$_REQUEST` superglobal allows an unauthenticated attacker to overwrite local variables in multiple PHP scripts. This vulnerability can be leveraged to completely bypass authentication checks, allowing unauthorized access to administrative and protected areas of the WeGIA application. Version 3.6.5 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:19:31 UTC

Technical Analysis

CVE-2026-28411 is a critical vulnerability in the WeGIA web management system developed by LabRedesCefetRJ, affecting all versions prior to 3.6.5. The root cause is the unsafe use of PHP's extract() function on the $_REQUEST superglobal array, which merges GET, POST, and COOKIE data. This function extracts variables from the request parameters directly into the local scope without proper sanitization or validation. An attacker can craft HTTP requests with specially named parameters that overwrite local variables controlling authentication logic. This leads to a complete bypass of authentication checks, granting unauthorized access to administrative and protected areas of the application. The vulnerability is classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-473 (Use of a Function with Insecure Default Behavior). The CVSS 3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no public exploits have been observed in the wild yet, the vulnerability poses a significant risk due to the critical nature of administrative access compromise. The issue was addressed in WeGIA version 3.6.5 by removing or securing the use of extract() on $_REQUEST. Organizations relying on WeGIA for managing charitable institution operations must prioritize upgrading to the patched version to prevent unauthorized access and potential data breaches.

Potential Impact

The impact of CVE-2026-28411 is severe for organizations using WeGIA, particularly charitable institutions that rely on it to manage sensitive data and administrative functions. Exploitation allows attackers to bypass all authentication mechanisms, gaining full administrative privileges without any credentials. This can lead to unauthorized data disclosure, modification, or deletion, severely compromising confidentiality and integrity. Attackers could manipulate or disrupt organizational operations, potentially affecting availability as well. Given that WeGIA is a web-based management tool, the vulnerability exposes organizations to remote attacks without requiring user interaction or prior access. The breach of administrative control could also facilitate further attacks, such as deploying malware, stealing donor information, or disrupting charitable activities. The critical CVSS score reflects the broad and deep impact on affected systems. Organizations worldwide using vulnerable versions face significant risks of data breaches, reputational damage, and operational disruption.

Mitigation Recommendations

To mitigate CVE-2026-28411, organizations should immediately upgrade WeGIA to version 3.6.5 or later, where the vulnerability has been fixed. If upgrading is not immediately feasible, organizations should implement temporary mitigations such as disabling or restricting access to the vulnerable PHP scripts, especially from untrusted networks. Conduct a thorough code review to identify and remove unsafe use of extract() on superglobals like $_REQUEST, replacing it with explicit input handling and validation. Employ strict input validation and sanitization to prevent variable overwriting. Implement web application firewalls (WAFs) with rules to detect and block suspicious parameter manipulation attempts targeting authentication variables. Monitor logs for unusual access patterns or parameter tampering. Educate developers on secure coding practices to avoid similar vulnerabilities. Finally, conduct regular security assessments and penetration testing to detect and remediate such issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:33:57.289Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a212fb32ffcdb8a2777760

Added to database: 2/27/2026, 9:56:11 PM

Last enriched: 3/7/2026, 9:19:31 PM

Last updated: 4/14/2026, 10:57:21 AM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses