CVE-2026-35473
Open Redirect in WeGIA control.php Enables Phishing Attacks
Publication date: 2026-04-06
Last updated on: 2026-04-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wegia | wegia | to 3.6.9 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this Open Redirect vulnerability in the WeGIA application, you should upgrade the application to version 3.6.9 or later, where the issue is fixed.
Additionally, avoid using or exposing the vulnerable /WeGIA/controle/control.php endpoint with the nextPage parameter combined with metodo=listarId and nomeClasse=IentradaControle until the upgrade is applied.
Can you explain this vulnerability to me?
The vulnerability is an Open Redirect issue in the WeGIA web application prior to version 3.6.9. It occurs in the /WeGIA/controle/control.php endpoint through the nextPage parameter when used with metodo=listarId and nomeClasse=IentradaControle. The application does not properly validate or restrict the nextPage parameter, which allows attackers to redirect users to arbitrary external websites.
This flaw can be exploited by attackers to trick users into visiting malicious sites by leveraging the trusted WeGIA domain.
How can this vulnerability impact me? :
This vulnerability can be abused for phishing attacks, credential theft, malware distribution, and social engineering. Because the redirect uses the trusted WeGIA domain, users may be more likely to trust the malicious links, increasing the risk of successful attacks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability is an Open Redirect in the WeGIA application that can be exploited for phishing, credential theft, malware distribution, and social engineering attacks. Such exploitation can lead to unauthorized disclosure or compromise of user data.
While the CVE description does not explicitly mention compliance with standards like GDPR or HIPAA, the potential for phishing and credential theft could result in violations of data protection and privacy regulations if personal or sensitive data is compromised.
Therefore, organizations using affected versions of WeGIA prior to 3.6.9 may face increased risk of non-compliance with regulations that require safeguarding user data and preventing unauthorized access.