Impact
The vulnerability allows injection of arbitrary JavaScript or HTML into the sccd GET parameter of the listar_memorandos_ativos.php page. This parameter is reflected directly into an HTML alert element without any input sanitization or encoding, enabling a reflected Cross‑Site Scripting attack. A malicious payload executed in the victim’s browser can steal session cookies, deface the interface, or redirect users to phishing sites.
Affected Systems
The web manager for charitable institutions, WeGIA, developed by LabRedesCefetRJ, is affected. Versions 3.6.6 and earlier contain the flaw; the issue was resolved in version 3.6.7.
Risk and Exploitability
The CVSS base score of 9.3 indicates critical severity. Exploitation requires only a crafted URL and does not need authentication or elevated privileges. The EPSS score below 1% suggests a low probability of current exploitation, and the vulnerability is not listed in the CISA KEV catalog. Threats arise when a victim opens a page containing the malicious sccd value, causing the browser to execute the injected script.
OpenCVE Enrichment