Description
WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos & listarId_Nome and nomeClasse=OrigemControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.
Published: 2026-04-06
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open Redirect enabling phishing and credential theft
Action: Patch
AI Analysis

Impact

An open redirect flaw exists in the WeGIA web manager’s /controle/control.php endpoint, specifically when the nextPage parameter is supplied together with metodo=listarTodos or listarId_Nome and nomeClasse=OrigemControle. The application accepts the nextPage value without validation, causing browsers to navigate the user to an arbitrary URL supplied by an attacker. This vulnerability, classified as CWE‑601, can be exploited to perform phishing, deliver malware, or manipulate legitimate users through social engineering while using the trusted WeGIA domain. The impact traffic reaches the victim’s browser and may lead to credential compromise or malicious downloads, but it does not directly expose internal data or allow code execution on the server.

Affected Systems

The vulnerability affects installations of the WeGIA web manager from any version prior to 3.6.9 released by LabRedesCefetRJ. Users running the software before the 3.6.9 update should be aware that the nextPage parameter is unrestricted and can be manipulated by external parties.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the EPSS score of less than 1% implies that exploitation attempts are currently rare. The flaw is not listed in the CISA KEV catalog. Exploitation requires an attacker to entice a user to click a crafted link that points to the vulnerable endpoint with a malicious nextPage value; a passive user interaction is sufficient and therefore the attack vector is likely “user‑initiated click” under the web application domain.

Generated by OpenCVE AI on April 9, 2026 at 18:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch to upgrade WeGIA to version 3.6.9 or newer
  • Verify that the nextPage parameter is now validated or removed from the URL handling process
  • Configure web application firewalls to block or filter unsolicited redirect attempts
  • Monitor access logs for suspicious redirect patterns and anomalous traffic from untrusted sources

Generated by OpenCVE AI on April 9, 2026 at 18:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Wegia
Wegia wegia
CPEs cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
Vendors & Products Wegia
Wegia wegia

Wed, 08 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Labredescefetrj
Labredescefetrj wegia
Vendors & Products Labredescefetrj
Labredescefetrj wegia

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos & listarId_Nome and nomeClasse=OrigemControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.
Title WeGIA - Open Redirect - OrigemControle - listarTodos() & listarId_Nome() - Unvalidated $_GET['nextPage']
Weaknesses CWE-601
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Labredescefetrj Wegia
Wegia Wegia
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T14:03:07.406Z

Reserved: 2026-04-02T17:03:42.074Z

Link: CVE-2026-35398

cve-icon Vulnrichment

Updated: 2026-04-08T13:59:43.506Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T21:16:21.740

Modified: 2026-04-09T17:39:41.960

Link: CVE-2026-35398

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:44:58Z

Weaknesses