Cyber Posture

CVE-2026-40285

High

Published: 17 April 2026

Published
17 April 2026
Modified
20 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 11.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-40285 is a high-severity SQL Injection (CWE-89) vulnerability. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation and sanitization of untrusted inputs like the cpf_usuario POST parameter before interpolation into SQL queries.

preventrecover

Mandates identification, reporting, testing, and correction of the specific SQL injection flaw in dao/memorando/UsuarioDAO.php and DespachoControle::verificarDespacho().

preventdetect

Enables vulnerability scanning to detect SQL injection flaws like CVE-2026-40285 and subsequent remediation to prevent exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in web app with session/identity overwrite enables network exploitation of public-facing application (T1190), privilege escalation via user impersonation (T1068), and unauthorized database queries (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

WeGIA is a web manager for charitable institutions. Versions prior to 3.6.10 contain a SQL injection vulnerability in dao/memorando/UsuarioDAO.php. The cpf_usuario POST parameter overwrites the session-stored user identity via extract($_REQUEST) in DespachoControle::verificarDespacho(), and the attacker-controlled value is then interpolated directly…

more

into a raw SQL query, allowing any authenticated user to query the database under an arbitrary identity. Version 3.6.10 fixes the issue.

Deeper analysisAI

CVE-2026-40285 is a SQL injection vulnerability in WeGIA, a web-based management system for charitable institutions, affecting versions prior to 3.6.10. The flaw exists in the dao/memorando/UsuarioDAO.php component, where the cpf_usuario POST parameter overwrites the session-stored user identity via extract($_REQUEST) in the DespachoControle::verificarDespacho() function. This attacker-controlled value is then directly interpolated into a raw SQL query, enabling unauthorized database access under a falsified identity.

The vulnerability can be exploited by any low-privileged authenticated user (PR:L) over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N), resulting in a CVSS v3.1 base score of 8.8 (C:H/I:H/A:H). Attackers can impersonate arbitrary users to query the database, potentially extracting sensitive data, modifying records, or disrupting services. It is associated with CWE-89 (SQL Injection), CWE-302 (Authentication Bypass by Assumed-Immutable Data), and CWE-473 (PHP External Variable Modification).

The GitHub Security Advisory GHSA-666r-v2m7-xgp9, published on 2026-04-17, documents the issue and confirms that upgrading to WeGIA version 3.6.10 addresses the vulnerability by fixing the insecure parameter handling and SQL interpolation.

Details

CWE(s)

CVEs Like This One

CVE-2026-22206Shared CWE-89
CVE-2025-24728Shared CWE-89
CVE-2026-32321Shared CWE-89
CVE-2024-48245Shared CWE-89
CVE-2026-29174Shared CWE-89
CVE-2025-24490Shared CWE-89
CVE-2024-57430Shared CWE-89
CVE-2026-23492Shared CWE-89
CVE-2025-26200Shared CWE-89
CVE-2019-25541Shared CWE-89

References