Unrated severityOSV Advisory· Published Jan 16, 2026· Updated Jan 16, 2026
WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=TipoSaidaControle)
CVE-2026-23727
Description
WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=TipoSaidaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2.
Affected products
1- Range: 0.9.4-beta, 3.3.0, 3.3.1, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/LabRedesCefetRJ/WeGIA/pull/1333mitrex_refsource_MISC
- github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2mitrex_refsource_MISC
- github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmq9-8p4w-m4f3mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.