WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_tipo_atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the tipo parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.16.
References
Link | Resource |
---|---|
https://github.com/LabRedesCefetRJ/WeGIA/commit/e2f258cc8fed8b7e5850114ce6e74bd9ba4f397f | Patch |
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg | Exploit Third Party Advisory |
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg | Exploit Third Party Advisory |
Configurations
History
10 Apr 2025, 18:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/LabRedesCefetRJ/WeGIA/commit/e2f258cc8fed8b7e5850114ce6e74bd9ba4f397f - Patch | |
References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg - Exploit, Third Party Advisory | |
First Time |
Wegia
Wegia wegia |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
04 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg - |
03 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-03 16:15
Updated : 2025-04-10 18:37
NVD link : CVE-2025-27418
Mitre link : CVE-2025-27418
CVE.ORG link : CVE-2025-27418
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')