Description
WeGIA is a web manager for charitable institutions. Prior to 3.6.2, The web application is vulnerable to clickjacking attacks. The WeGIA application does not send any defensive HTTP headers related to framing protection. In particular, X-Frame-Options is missing andContent-Security-Policy with frame-ancestors directive is not configured. Because of this, an attacker can load any WeGIA page inside a malicious HTML document, overlay deceptive elements, hide real buttons, or force accidental interaction with sensitive workflows. This vulnerability is fixed in 3.6.2.
Published: 2026-01-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Considerable UI Deception and Possible Unintended User Actions
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows an attacker to embed any page of the WeGIA web manager within a malicious iframe because the application fails to send framing protection headers. This omission enables clickjacking, allowing attackers to overlay deceptive content, conceal real controls, or trick users into interacting with hidden elements that trigger sensitive workflows. As a result, unauthorized or accidental actions can be performed without the user’s knowledge, potentially exposing confidential data or altering system state.

Affected Systems

LabRedesCefetRJ’s WeGIA web manager is affected. Versions prior to 3.6.2 are vulnerable.

Risk and Exploitability

The CVSS score is 4.3, indicating a low to moderate risk. The EPSS score is below 1 %, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited exploitation activity. Attackers can exploit the flaw via a web‑based attack that hosts a malicious page containing an iframe to a vulnerable WeGIA page; no authentication or special privileges are required beyond user interaction. The risk therefore mainly stems from social engineering and UI deception rather than direct code execution.

Generated by OpenCVE AI on April 18, 2026 at 05:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading WeGIA to version 3.6.2 or later.
  • If upgrading is not feasible, configure the server to send framing‑protection headers, such as `X‑Frame‑Options: DENY` or a Content‑Security‑Policy directive `frame‑ancestors 'none'`, on all responses.
  • Ensure that other web pages served by the same domain are also protected, and remove any existing `<iframe>` elements that load external content.

Generated by OpenCVE AI on April 18, 2026 at 05:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*

Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wegia
Wegia wegia
Vendors & Products Wegia
Wegia wegia

Fri, 16 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
Description WeGIA is a web manager for charitable institutions. Prior to 3.6.2, The web application is vulnerable to clickjacking attacks. The WeGIA application does not send any defensive HTTP headers related to framing protection. In particular, X-Frame-Options is missing andContent-Security-Policy with frame-ancestors directive is not configured. Because of this, an attacker can load any WeGIA page inside a malicious HTML document, overlay deceptive elements, hide real buttons, or force accidental interaction with sensitive workflows. This vulnerability is fixed in 3.6.2.
Title WeGIA Clickjacking Vulnerability
Weaknesses CWE-1021
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-16T20:31:29.007Z

Reserved: 2026-01-15T15:45:01.956Z

Link: CVE-2026-23731

cve-icon Vulnrichment

Updated: 2026-01-16T20:31:22.065Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-16T20:15:51.327

Modified: 2026-01-30T18:30:32.513

Link: CVE-2026-23731

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:45:38Z

Weaknesses