CVE-2026-42871
Information Disclosure in WeGIA Web Manager
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| labredescefetrj | wegia | to 3.7.0 (exc) |
| labredescefetrj | wegia | to 3.6.10 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability causes information disclosure by displaying overly descriptive error messages that include database-related details. This leakage of sensitive system information could potentially increase the risk of unauthorized access or data breaches.
Such information disclosure issues can negatively impact compliance with data protection standards and regulations like GDPR and HIPAA, which require safeguarding sensitive information and minimizing exposure of system details that could be exploited by attackers.
By exposing backend infrastructure details, the vulnerability may increase the attack surface, thereby raising the risk of incidents that these regulations aim to prevent.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade the WeGIA application to version 3.7.0 or later, where this vulnerability has been fixed.
Until the upgrade can be performed, consider implementing web application firewall (WAF) rules to block or filter requests to the vulnerable endpoint atendido/familiar_docfamiliar.php, especially those that attempt file uploads.
Additionally, review and harden error handling configurations to avoid verbose error messages being displayed to end users.
Can you explain this vulnerability to me?
CVE-2026-42871 is a vulnerability in WeGIA, a web manager for charitable institutions, affecting versions prior to 3.7.0. The issue occurs in the file atendido/familiar_docfamiliar.php, where the application displays overly descriptive error messages that include database-related details.
These verbose error messages disclose sensitive information about the backend infrastructure, such as permitted file extensions, buffer sizes, or image processing libraries. This information disclosure can help attackers gather system details and map the backend, which may assist them in crafting more effective attacks.
The vulnerability is triggered during file uploads when error messages leak implementation details, and it was fixed in version 3.7.0.
How can this vulnerability impact me? :
This vulnerability can impact you by exposing sensitive backend information through overly descriptive error messages. Attackers can use this information to better understand your system's infrastructure and security mechanisms.
With this knowledge, attackers may be able to craft targeted exploits or bypass security filters, increasing the risk of further attacks or unauthorized access.
Although the severity is classified as low, the information disclosure expands the attack surface and could lead to more serious security breaches if combined with other vulnerabilities.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by accessing the vulnerable URL path atendido/familiar_docfamiliar.php on the WeGIA web manager application and observing if overly descriptive error messages containing database-related details are displayed.
Specifically, triggering error conditions such as invalid file uploads or malformed requests to this endpoint may cause the application to reveal sensitive implementation details like permitted file extensions, buffer sizes, or image processing libraries.
A simple detection command using curl could be:
- curl -i -X POST -F '[email protected]' https://[target]/WEGIA/html/atendido/familiar_docfamiliar.php
If the response contains detailed error messages with database or backend information, the system is vulnerable.