Impact
A redirect parameter in WeGIA is taken directly from the URL query string without any validation or whitelist checks before being passed to an HTTP header that sends the client to the supplied location. This flaw enables an attacker to supply an arbitrary URL in the redirect field and force users of the web application to be sent to a malicious site. The vulnerability is a classic example of CWE‑601 – Open Redirect, which can be leveraged for phishing, credential theft, or other social engineering attacks against unsuspecting users.
Affected Systems
The flaw is present in all releases of the WeGIA web manager from LabRedesCefetRJ before version 3.6.9. Attackers can exploit any instance of the application running a pre‑3.6.9 release.
Risk and Exploitability
The CVSS score of 5.1 indicates a moderate severity, and an EPSS score of less than 1% suggests a low probability of immediate exploitation. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog, and no exploit has been publicly disclosed. Attackers can craft a malicious URL containing the redirect parameter and deliver it to a target user, potentially through email or other links. The exploit requires no special privileges beyond the user’s ability to visit the crafted link.
OpenCVE Enrichment