Impact
An attacker can manipulate the nextPage parameter on the WeGIA control.php endpoint, causing the application to redirect users to arbitrary external sites. This unvalidated redirection can be leveraged for phishing, credential theft, malware delivery, and other social engineering attacks that benefit from the trust users place in the WeGIA domain.
Affected Systems
The vulnerability exists in the WeGIA web manager produced by LabRedesCefetRJ. Versions prior to 3.6.2 of the WeGIA application are affected, regardless of minor sub-releases. The flaw is present in the /Controle/control.php resource when the query string includes metodo=listarDescricao and nomeClasse=ProdutoControle.
Risk and Exploitability
The vulnerability carries a CVSS score of 4.8, indicating moderate impact severity. EPSS analysis shows a very low exploitation probability (<1%). It is not listed in the CISA KEV catalog. Attackers do not need any authentication to trigger the redirect; a crafted HTTP request to the vulnerable endpoint suffices. Given the nature of the flaw, exploitation is straightforward but the overall risk is moderated by the low predicted attack frequency.
OpenCVE Enrichment