Impact
The vulnerability is an open redirect flaw in the WeGIA web manager’s controll/control.php endpoint. When a user supplies the nextPage parameter together with metodo=listarTodos and nomeClasse=ProdutoControle, the application accepts the value without validation, allowing the attacker to craft a URL that directs legitimate users to an arbitrary external site. This flaw can be exploited for phishing campaigns, credential theft, malware delivery, or other social‑engineering tactics that rely on the trusted appearance of the WeGIA domain.
Affected Systems
The affected systems are installations of the WeGIA web manager produced by LabRedesCefetRJ that run any version earlier than 3.6.2. The problem was fixed in the 3.6.2 release, so any deployment using an older version remains vulnerable.
Risk and Exploitability
The flaw carries a moderate CVSS score of 4.8 and an EPSS score of less than 1 %, indicating a low probability of exploitation. It is not listed in the CISA KEV catalog. An attacker can exploit the vulnerability by issuing a normal HTTP request to the vulnerable endpoint without needing privileged access. Given the limited exploitation likelihood and the scope of impact, the risk level can be viewed as medium but still warrants remediation.
OpenCVE Enrichment