Home

Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-09 | Updated 2025-12-10 | Assigner GitHub_M




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 3.5.5
affected

References

github.com/.../WeGIA/security/advisories/GHSA-9843-qm67-73h2 exploit

github.com/.../WeGIA/security/advisories/GHSA-9843-qm67-73h2

github.com/...ommit/c80b8cacd310fd459df61c030fb267c5e68cafc7

github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.5.5

cve.org (CVE-2025-67496)

nvd.nist.gov (CVE-2025-67496)

Download JSON