WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=TipoSaidaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/pull/1333 | Issue Tracking Patch |
| https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2 | Release Notes |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmq9-8p4w-m4f3 | Exploit Mitigation Vendor Advisory |
Configurations
History
30 Jan 2026, 18:29
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/LabRedesCefetRJ/WeGIA/pull/1333 - Issue Tracking, Patch | |
| References | () https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2 - Release Notes | |
| References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmq9-8p4w-m4f3 - Exploit, Mitigation, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| First Time |
Wegia wegia
Wegia |
|
| CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* |
16 Jan 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-16 20:15
Updated : 2026-01-30 18:29
NVD link : CVE-2026-23727
Mitre link : CVE-2026-23727
CVE.ORG link : CVE-2026-23727
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
