CVE-2026-35473
Received Received - Intake
Open Redirect in WeGIA control.php Enables Phishing Attacks

Publication date: 2026-04-06

Last updated on: 2026-04-10

Assigner: GitHub, Inc.

Description
WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IentradaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-06
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wegia wegia to 3.6.9 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this Open Redirect vulnerability in the WeGIA application, you should upgrade the application to version 3.6.9 or later, where the issue is fixed.

Additionally, avoid using or exposing the vulnerable /WeGIA/controle/control.php endpoint with the nextPage parameter combined with metodo=listarId and nomeClasse=IentradaControle until the upgrade is applied.


Can you explain this vulnerability to me?

The vulnerability is an Open Redirect issue in the WeGIA web application prior to version 3.6.9. It occurs in the /WeGIA/controle/control.php endpoint through the nextPage parameter when used with metodo=listarId and nomeClasse=IentradaControle. The application does not properly validate or restrict the nextPage parameter, which allows attackers to redirect users to arbitrary external websites.

This flaw can be exploited by attackers to trick users into visiting malicious sites by leveraging the trusted WeGIA domain.


How can this vulnerability impact me? :

This vulnerability can be abused for phishing attacks, credential theft, malware distribution, and social engineering. Because the redirect uses the trusted WeGIA domain, users may be more likely to trust the malicious links, increasing the risk of successful attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is an Open Redirect in the WeGIA application that can be exploited for phishing, credential theft, malware distribution, and social engineering attacks. Such exploitation can lead to unauthorized disclosure or compromise of user data.

While the CVE description does not explicitly mention compliance with standards like GDPR or HIPAA, the potential for phishing and credential theft could result in violations of data protection and privacy regulations if personal or sensitive data is compromised.

Therefore, organizations using affected versions of WeGIA prior to 3.6.9 may face increased risk of non-compliance with regulations that require safeguarding user data and preventing unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart