Description
WeGIA is a Web Manager for Charitable Institutions. Prior to 3.6.2, a Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the WeGIA system, specifically within the html/memorando/insere_despacho.php file. The application fails to properly sanitize or encode user-supplied input via the id_memorando GET parameter before reflecting it into the HTML source (likely inside a <script> block or an attribute). This allows unauthenticated attackers to inject arbitrary JavaScript or HTML into the context of the user's browser session. This vulnerability is fixed in 3.6.2.
Published: 2026-01-16
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Reflected XSS enabling arbitrary JavaScript execution and UI redressing
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a Reflected Cross‑Site Scripting flaw (CWE‑79) where unsanitized data from the id_memorando GET parameter is echoed back into the page, allowing an attacker to inject malicious JavaScript or HTML. If executed in the victim’s browser, this can perform actions on behalf of the user, redirect them, or steal session data, effectively compromising confidentiality and integrity within the client context.

Affected Systems

The affected product is WeGIA, a web manager for charitable institutions, developed by LabRedesCefetRJ. All releases prior to version 3.6.2 are vulnerable; 3.6.2 and later contain the fix.

Risk and Exploitability

The flaw carries a CVSS score of 9.1, indicating critical severity. The EPSS score is below 1 %, implying a low probability of widespread exploitation at present. It is not listed in CISA’s KEV catalog. Attacks would likely involve an unauthenticated user clicking a crafted link containing malicious payload that exploits the id_memorando parameter, resulting in code execution in the victim’s browser. While the impact is limited to the client side, it can facilitate further attacks such as session hijacking if cookies lack proper flags.

Generated by OpenCVE AI on April 18, 2026 at 05:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to WeGIA version 3.6.2 or newer to apply the vendor fix for the reflected XSS vulnerability.
  • If an immediate upgrade is not possible, implement strict input validation or a web application firewall rule that blocks or sanitizes the id_memorando query parameter before it is reflected in the response.
  • Configure the application to set HTTP‑Only and Secure flags on session cookies and employ proper output encoding for all user‑supplied data to mitigate the impact of any remaining XSS vectors.

Generated by OpenCVE AI on April 18, 2026 at 05:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*

Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wegia
Wegia wegia
Vendors & Products Wegia
Wegia wegia

Fri, 16 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description WeGIA is a Web Manager for Charitable Institutions. Prior to 3.6.2, a Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the WeGIA system, specifically within the html/memorando/insere_despacho.php file. The application fails to properly sanitize or encode user-supplied input via the id_memorando GET parameter before reflecting it into the HTML source (likely inside a <script> block or an attribute). This allows unauthenticated attackers to inject arbitrary JavaScript or HTML into the context of the user's browser session. This vulnerability is fixed in 3.6.2.
Title WeGIA has a Reflected Cross-Site Scripting (XSS) vulnerability allowing arbitrary code execution and UI redressing.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-16T21:35:52.457Z

Reserved: 2026-01-15T15:45:01.955Z

Link: CVE-2026-23722

cve-icon Vulnrichment

Updated: 2026-01-16T21:35:46.364Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-16T20:15:50.017

Modified: 2026-01-30T18:27:52.323

Link: CVE-2026-23722

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:45:38Z

Weaknesses