Cyber Posture

CVE-2026-31894

HighPublic PoC

Published: 11 March 2026

Published
11 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0009 25.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31894 is a high-severity Link Following (CWE-59) vulnerability in Wegia Wegia. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

CVE enables unauthenticated remote exploitation of public-facing web app (backup restore) for arbitrary local file read via symlink following during PharData extraction and glob/file_get_contents, directly mapping to T1190 for initial access and T1005 for resulting data collection from local system files/configs.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

WeGIA is a web manager for charitable institutions. In 3.6.5, The patched loadBackupDB() extracts tar.gz archives to a temporary directory using PHP's PharData class, then uses glob() and file_get_contents() to read SQL files from the extracted contents. Neither the extraction…

more

nor the file reading validates whether archive members are symbolic links. This vulnerability is fixed in 3.6.6.

Deeper analysisAI

CVE-2026-31894 is a file access vulnerability (CWE-59: Improper Link Resolution Before File Access) affecting WeGIA version 3.6.5, an open-source web manager for charitable institutions. The issue resides in the loadBackupDB() function, which processes uploaded tar.gz backup archives by extracting them to a temporary directory using PHP's PharData class. It then employs glob() and file_get_contents() to read SQL files from the extracted contents. Critically, neither the extraction process nor the file reading operations validate whether archive members are symbolic links, enabling potential symlink following to unintended files. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and was published on 2026-03-11.

An unauthenticated remote attacker can exploit this vulnerability by supplying a malicious tar.gz archive via the backup restoration feature. During extraction, symlinks within the archive can point to arbitrary files on the server, such as sensitive configuration files or database contents. When the application subsequently reads files matching the glob pattern, it follows these symlinks, resulting in unauthorized disclosure of the targeted files' contents to the attacker. This achieves high confidentiality impact without requiring privileges, user interaction, or altering system integrity or availability.

The WeGIA GitHub security advisory (GHSA-6mmm-27h8-8g55) and the fixing commit (79e7a164eddb527e3b331037b7a4defb8c115d50) confirm the issue was resolved in version 3.6.6. Practitioners should advise upgrading to 3.6.6 or later, where proper symlink validation is implemented during extraction and file handling. No additional workarounds are detailed in the provided references.

Details

CWE(s)

Affected Products

wegia
wegia
3.6.5

CVEs Like This One

CVE-2025-27096Same product: Wegia Wegia
CVE-2024-57034Same product: Wegia Wegia
CVE-2025-30365Same product: Wegia Wegia
CVE-2026-28411Same product: Wegia Wegia
CVE-2026-28408Same product: Wegia Wegia
CVE-2025-24902Same product: Wegia Wegia
CVE-2025-26608Same product: Wegia Wegia
CVE-2025-22140Same product: Wegia Wegia
CVE-2025-23219Same product: Wegia Wegia
CVE-2025-22141Same product: Wegia Wegia

References