Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.9
WeGIA Web Manager: Unvalidated Archive Extraction
CVE-2026-31894
Summary
WeGIA's database backup feature does not properly check for malicious links in its backup archives. This could allow an attacker to execute arbitrary code. Upgrade to version 3.6.6 to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| wegia | wegia | 3.6.5 | – |
Original title
WeGIA is a web manager for charitable institutions. In 3.6.5, The patched loadBackupDB() extracts tar.gz archives to a temporary directory using PHP's PharData class, then uses glob() and file_get_...
Original description
WeGIA is a web manager for charitable institutions. In 3.6.5, The patched loadBackupDB() extracts tar.gz archives to a temporary directory using PHP's PharData class, then uses glob() and file_get_contents() to read SQL files from the extracted contents. Neither the extraction nor the file reading validates whether archive members are symbolic links. This vulnerability is fixed in 3.6.6.
nvd CVSS4.0
6.9
Vulnerability type
CWE-59
Link Following
Published: 11 Mar 2026 · Updated: 14 Mar 2026 · First seen: 11 Mar 2026