CVE-2026-23723: SQL Injection (Error-Based) Vulnerability in id_memorando Parameter on Atendido_ocorrenciaControle Endpoint
CVE Publication: https://www.cve.org/CVERecord?id=CVE-2026-23723
Summary
An authenticated SQL Injection vulnerability was identified in the Atendido_ocorrenciaControle endpoint via the id_memorando parameter. This flaw allows for full database exfiltration, exposure of sensitive PII, and potential arbitrary file reads in misconfigured environments.
Details
Vulnerable Endpoint: Atendido_ocorrenciaControle
Parameter: id_memorando
PoC
Payload:
| |
Example url:
| |
Steps to Reproduce:
- Login to the WeGIA system (user:admin, password: wegia) and obtain a valid session cookie.
- The vulnerability was confirmed on the official security testing server:
sec.wegia.org:8000. - Send a GET request to the vulnerable endpoint with the following payload:

- Observe that the system returns a error message, confirming the injection:
![]()
Impact
- Unauthorized access to sensitive data (e.g., users, passwords, logs).
- Database enumeration (schemas, tables, users, versions).
- Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).
- Full compromise of the application if chained with other vulnerabilities.
- This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.
Reference
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjp
Finder
By: CVE-Hunters

