WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to version 3.5.1, a reflected cross-site scripting (XSS) vulnerability was identified in the editar_info_pessoal.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the action parameter. The vulnerable endpoint is GET /WeGIA/html/pessoa/editar_info_pessoal.php?action=1. This issue has been patched in version 3.5.1.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Oct 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wegia
Wegia wegia |
|
| CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wegia
Wegia wegia |
|
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to version 3.5.1, a reflected cross-site scripting (XSS) vulnerability was identified in the editar_info_pessoal.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the action parameter. The vulnerable endpoint is GET /WeGIA/html/pessoa/editar_info_pessoal.php?action=1. This issue has been patched in version 3.5.1. | |
| Title | WeGIA Vulnerable to Reflected Cross-Site Scripting via Endpoint 'pessoa/editar_info_pessoal.php' Parameter 'action' | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-21T16:34:57.351Z
Updated: 2025-10-21T17:55:53.913Z
Reserved: 2025-10-16T19:24:37.267Z
Link: CVE-2025-62598
Updated: 2025-10-21T17:55:49.307Z
Status : Analyzed
Published: 2025-10-21T17:15:41.053
Modified: 2025-10-22T14:19:55.570
Link: CVE-2025-62598
No data.