WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_status_atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the status parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.16.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Apr 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wegia
Wegia wegia |
|
CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wegia
Wegia wegia |
|
Metrics |
cvssV3_1
|
Tue, 04 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 03 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_status_atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the status parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.16. | |
Title | WeGIA Contains a Stored Cross-Site Scripting (XSS) in 'adicionar_status_atendido.php' via the 'status' parameter | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-03T16:01:25.506Z
Updated: 2025-03-04T16:45:25.833Z
Reserved: 2025-02-24T15:51:17.268Z
Link: CVE-2025-27417

Updated: 2025-03-04T16:45:17.710Z

Status : Analyzed
Published: 2025-03-03T16:15:43.820
Modified: 2025-04-11T19:11:56.647
Link: CVE-2025-27417

No data.