CVE-2026-33135

WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, which is directly echoed into the HTML response without any sanitization or encoding. The script /html/memorando/novo_memorandoo.php reads HTTP GET parameters to display dynamic success messages to the user. At approximately line 273, the code checks if $_GET['msg'] equals 'success'. If true, it directly concatenates $_GET['sccs'] into an HTML alert <div> and outputs it to the browser. This issue has been fixed in version 3.6.7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*

History

20 Mar 2026, 19:25

Type Values Removed Values Added
Summary
  • (es) WeGIA es un gestor web para instituciones benéficas. Las versiones 3.6.6 e inferiores tienen una vulnerabilidad de Cross-Site Scripting (XSS) Reflejado en el endpoint novo_memorandoo.php. Un atacante puede inyectar JavaScript arbitrario en el parámetro GET sccs, el cual es directamente reflejado en la respuesta HTML sin ninguna sanitización o codificación. El script /html/memorando/novo_memorandoo.php lee parámetros GET HTTP para mostrar mensajes de éxito dinámicos al usuario. Aproximadamente en la línea 273, el código verifica si $_GET['msg'] es igual a 'success'. Si es verdadero, concatena directamente $_GET['sccs'] en un de alerta HTML y lo envía al navegador. Este problema ha sido solucionado en la versión 3.6.7.
CPE cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
First Time Wegia wegia
Wegia
References () https://github.com/LabRedesCefetRJ/WeGIA/pull/1459 - () https://github.com/LabRedesCefetRJ/WeGIA/pull/1459 - Issue Tracking, Patch
References () https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7 - () https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7 - Release Notes
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w5rv-5884-w94v - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w5rv-5884-w94v - Exploit, Vendor Advisory

20 Mar 2026, 14:16

Type Values Removed Values Added
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w5rv-5884-w94v - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w5rv-5884-w94v -

20 Mar 2026, 11:18

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 11:18

Updated : 2026-03-20 19:25


NVD link : CVE-2026-33135

Mitre link : CVE-2026-33135

CVE.ORG link : CVE-2026-33135


JSON object : View

Products Affected

wegia

  • wegia
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')