Description
WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9. | |
| Title | WeGIA - Open Redirect - backup redirection — Unvalidated $_GET['redirect'] | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T21:17:04.964Z
Reserved: 2026-04-02T20:49:44.453Z
Link: CVE-2026-35475
No data.
Status : Received
Published: 2026-04-06T22:16:24.340
Modified: 2026-04-06T22:16:24.340
Link: CVE-2026-35475
No data.
OpenCVE Enrichment
No data.
Weaknesses