WeGIA is a web manager for charitable institutions. Prior to 3.6.2, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the html/atendido/cadastro_ocorrencia.php endpoint of the WeGIA application. The application does not sanitize user-controlled data before rendering it inside the “Atendido” selection dropdown. This vulnerability is fixed in 3.6.2.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/pull/1333 | Issue Tracking Patch |
| https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2 | Release Notes |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3r3q-8573-g3cq | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-16 20:15
Updated : 2026-01-30 18:29
NVD link : CVE-2026-23724
Mitre link : CVE-2026-23724
CVE.ORG link : CVE-2026-23724
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
