WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IsaidaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4qxc-5j5f-4gp5 | Exploit Vendor Advisory |
Configurations
History
09 Apr 2026, 17:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4qxc-5j5f-4gp5 - Exploit, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| First Time |
Wegia wegia
Wegia |
|
| CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* |
06 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 21:16
Updated : 2026-04-09 17:40
NVD link : CVE-2026-35396
Mitre link : CVE-2026-35396
CVE.ORG link : CVE-2026-35396
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
