WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, an unsafe use of the `extract()` function on the `$_REQUEST` superglobal allows an unauthenticated attacker to overwrite local variables in multiple PHP scripts. This vulnerability can be leveraged to completely bypass authentication checks, allowing unauthorized access to administrative and protected areas of the WeGIA application. Version 3.6.5 fixes the issue.
History

Fri, 27 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
Description WeGIA is a web manager for charitable institutions. Prior to version 3.6.5, an unsafe use of the `extract()` function on the `$_REQUEST` superglobal allows an unauthenticated attacker to overwrite local variables in multiple PHP scripts. This vulnerability can be leveraged to completely bypass authentication checks, allowing unauthorized access to administrative and protected areas of the WeGIA application. Version 3.6.5 fixes the issue.
Title WeGIA Vulnerable to Authentication Bypass via `extract($_REQUEST)`
Weaknesses CWE-288
CWE-473
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-27T21:52:05.032Z

Reserved: 2026-02-27T15:33:57.289Z

Link: CVE-2026-28411

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-27T22:16:24.170

Modified: 2026-02-27T22:16:24.170

Link: CVE-2026-28411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.