WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to 3.5.1, the log parameter in configuracao_geral.php is vulnerable to Reflected Cross-Site Scripting (XSS). An attacker can inject arbitrary JavaScript, which executes in the victim’s browser. This vulnerability is fixed in 3.5.1.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/commit/eddb9b134883cac5d0de770bfcca6e05bfcbd684 | Patch |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g6hr-2rhx-f8q4 | Exploit Vendor Advisory |
Configurations
History
20 Oct 2025, 16:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/LabRedesCefetRJ/WeGIA/commit/eddb9b134883cac5d0de770bfcca6e05bfcbd684 - Patch | |
| References | () https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g6hr-2rhx-f8q4 - Exploit, Vendor Advisory | |
| First Time |
Wegia
Wegia wegia |
|
| CPE | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* |
13 Oct 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-13 22:15
Updated : 2025-10-20 16:02
NVD link : CVE-2025-62358
Mitre link : CVE-2025-62358
CVE.ORG link : CVE-2025-62358
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
