Description
WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IsaidaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.
Published: 2026-04-06
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open Redirect via unvalidated URL parameter (CWE-601)
Action: Apply Patch
AI Analysis

Impact

WeGIA, a web manager for charitable institutions, has an open‑redirect flaw in versions prior to 3.6.9 that occurs in the /WeGIA/controle/control.php endpoint. By providing a crafted nextPage value in a request that also uses metodo=listarId and nomeClasse=IsaidaControle, an attacker can force a user’s browser to navigate to an arbitrary external site. The ability to redirect users through a trusted domain can be leveraged for phishing, credential harvesting, malware delivery, and other social‑engineering attacks. This vulnerability does not allow direct code execution but undermines user trust and confidentiality of information disclosed during interactions with the redirected site.

Affected Systems

Any deployment of WeGIA from LabRedesCefetRJ running a version older than 3.6.9 is affected. The vulnerability has been fixed in version 3.6.9 and later.

Risk and Exploitability

The CVSS v3.1 score of 5.1 indicates moderate severity. Because the redirection can be forced through a simple HTTP GET, exploitation is trivial if a victim follows a malicious link. EPSS data is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting that widespread exploitation is not yet documented. Nonetheless, the use of a trusted domain increases the likelihood that users will comply with the redirect, making the threat more consequential in targeted phishing campaigns.

Generated by OpenCVE AI on April 7, 2026 at 02:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch by upgrading to WeGIA 3.6.9 or later.

Generated by OpenCVE AI on April 7, 2026 at 02:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Labredescefetrj
Labredescefetrj wegia
Vendors & Products Labredescefetrj
Labredescefetrj wegia

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IsaidaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.
Title WeGIA - Open Redirect - IsaidaControle - listarId() - Unvalidated $_GET['nextPage']
Weaknesses CWE-601
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Labredescefetrj Wegia
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T16:18:28.883Z

Reserved: 2026-04-02T17:03:42.074Z

Link: CVE-2026-35396

cve-icon Vulnrichment

Updated: 2026-04-07T16:18:25.807Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-06T21:16:21.600

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-35396

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:05Z

Weaknesses