CVE-2026-33135
Refleksywne XSS w WeGIA (do wersji 3.6.6) pozwala atakującemu na wstrzyknięcie dowolnego JavaScriptu, co może prowadzić do kradzieży danych…
WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, which is directly echoed into the HTML response without any sanitization or encoding. The script /html/memorando/novo_memorandoo.php reads HTTP GET parameters to display dynamic success messages to the user. At approximately line 273, the code checks if $_GET['msg'] equals 'success'. If true, it directly concatenates $_GET['sccs'] into an HTML alert <div> and outputs it to the browser. This issue has been fixed in version 3.6.7.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-03-20 11:18:03 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-20 19:25:45 UTC |
- https://github.com/LabRedesCefetRJ/WeGIA/pull/1459 (security-advisories@github.com) [Issue Tracking, Patch]
- https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7 (security-advisories@github.com) [Release Notes]
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w5rv-5884-w94v (security-advisories@github.com) [Exploit, Vendor Advisory]