CVE-2025-30366

WeGIA is a Web manager for charitable institutions. Versions prior to 3.2.8 are vulnerable to stored cross-site scripting. This vulnerability allows unauthorized scripts to be executed within the user's browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page. Version 3.2.8 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*

History

10 Apr 2025, 14:51

Type Values Removed Values Added
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pwr9-fr8r-8h48 - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pwr9-fr8r-8h48 - Exploit, Vendor Advisory
CPE cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*
Summary
  • (es) WeGIA es un gestor web para instituciones benéficas. Las versiones anteriores a la 3.2.8 son vulnerables a cross-site scripting almacenado. Esta vulnerabilidad permite la ejecución de scripts no autorizados en el navegador del usuario. El XSS almacenado es especialmente crítico, ya que el código malicioso se almacena permanentemente en el servidor y se ejecuta cada vez que se carga una página comprometida, afectando a todos los usuarios que acceden a ella. La versión 3.2.8 corrige el problema.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time Wegia
Wegia wegia

27 Mar 2025, 19:15

Type Values Removed Values Added
References () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pwr9-fr8r-8h48 - () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pwr9-fr8r-8h48 -

27 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 17:15

Updated : 2025-04-10 14:51


NVD link : CVE-2025-30366

Mitre link : CVE-2025-30366

CVE.ORG link : CVE-2025-30366


JSON object : View

Products Affected

wegia

  • wegia
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')