Description
WeGIA is a web manager for charitable institutions. In versions prior to 3.6.10, a Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the "Nome" field in the "Informações Pacientes" page. The payload is stored and executed when the patient information is viewed. Version 3.6.10 fixes the issue.
Published: 2026-04-17
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

WeGIA is a web manager for charitable institutions that stores patient information. In versions earlier than 3.6.10 the application accepts user input for the “Nome” (Name) field in the patient information page without proper sanitization. An authenticated user can therefore inject a malicious JavaScript payload that is persisted in the database and executed automatically when the patient record is viewed by any user. This stored cross‑site scripting flaw can allow the injected script to run in the context of the victim’s browser, potentially affecting data integrity or exposing sensitive information to the attacker.

Affected Systems

The flaw exists in all releases of WeGIA distributed by LabRedesCefetRJ that precede version 3.6.10. Any deployment that has not applied the 3.6.10 update remains vulnerable. Versions 3.6.10 and later contain the fix that removes the insecure input handling for the Nome field.

Risk and Exploitability

The CVSS score of 6.8 classifies this vulnerability as moderate severity. EPSS is not available at the present time, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a legitimate user account with permission to edit patient records; once a malicious payload is stored, it will execute for every user who views the affected patient data. Consequently the attack surface is limited to authenticated users with editing privileges, but the impact spreads to any viewer of the record.

Generated by OpenCVE AI on April 18, 2026 at 17:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to WeGIA 3.6.10 or any later release that includes the fix.
  • Limit access to the patient information editing interface so that only trusted staff members can modify records.
  • Implement server‑side sanitization or whitelisting for the Nome field to remove script tags or other potentially dangerous content if an upgrade cannot be performed immediately.

Generated by OpenCVE AI on April 18, 2026 at 17:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Labredescefetrj
Labredescefetrj wegia
Vendors & Products Labredescefetrj
Labredescefetrj wegia

Fri, 17 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description WeGIA is a web manager for charitable institutions. In versions prior to 3.6.10, a Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the "Nome" field in the "Informações Pacientes" page. The payload is stored and executed when the patient information is viewed. Version 3.6.10 fixes the issue.
Title WeGIA has stored XSS in profile_paciente.php
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Labredescefetrj Wegia
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-17T20:03:14.016Z

Reserved: 2026-04-10T20:22:44.035Z

Link: CVE-2026-40283

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-17T20:16:35.793

Modified: 2026-04-17T20:16:35.793

Link: CVE-2026-40283

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:15:05Z

Weaknesses