WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to 3.5.0, an Open Redirect vulnerability was identified in the control.php endpoint of the WeGIA application, specifically in the nextPage parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This vulnerability is fixed in 3.5.0.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wegia
Wegia wegia |
|
CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wegia
Wegia wegia |
|
Metrics |
cvssV3_1
|
Tue, 14 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 13 Oct 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to 3.5.0, an Open Redirect vulnerability was identified in the control.php endpoint of the WeGIA application, specifically in the nextPage parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This vulnerability is fixed in 3.5.0. | |
Title | WeGIA Open Redirect Vulnerability in `control.php` endpoint `nextPage` parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle) | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-13T21:27:38.572Z
Updated: 2025-10-14T15:15:13.687Z
Reserved: 2025-10-10T14:22:48.202Z
Link: CVE-2025-62361

Updated: 2025-10-14T15:15:09.920Z

Status : Analyzed
Published: 2025-10-13T22:15:33.597
Modified: 2025-10-20T15:38:20.980
Link: CVE-2025-62361

No data.