Impact
This vulnerability is a stored cross‑site scripting flaw in the intercorrencia_visualizar.php page. An authenticated user can submit malicious JavaScript that is stored and later executed when anyone views the notification page. The injected script can hijack user sessions and take over accounts, compromising confidentiality and integrity of user credentials.
Affected Systems
The affected product is the WeGIA web manager from LabRedesCefetRJ. Versions prior to 3.6.10 contain the flaw. Users of any earlier releases should verify their installed version.
Risk and Exploitability
The CVSS score of 6.4 places this issue in the medium severity range. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, indicating no confirmed exploitation at this time. Because the flaw requires authentication, attackers are limited to victims with valid credentials, but once the script is injected, the attacker can hijack sessions of that account and potentially other users who view the page. The likely attack vector is a web‑based authenticated session that submits malicious payloads.
OpenCVE Enrichment