CVE-2026-45026
Received Received - Intake
Stored XSS in WeGIA Web Manager Prior to 3.7.3

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: GitHub, Inc.

Description
WeGIA is a web manager for charitable institutions. In versions prior to 3.7.3, a Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript into the Processo de AceitaΓ§Γ£o (html/atendido/processo_aceitacao.php) page, which is executed when user access the the page, enabling session hijacking and account takeover. This vulnerability is fixed in 3.7.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-12
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wegia wegia to 3.7.3 (exc)
labredescefetrj wegia to 3.7.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-45026 is a Stored Cross-Site Scripting (XSS) vulnerability in the WeGIA web manager application, specifically in the Processo de AceitaΓ§Γ£o page (html/atendido/processo_aceitacao.php).

This vulnerability allows an authenticated user to inject malicious JavaScript code into the page by exploiting improper sanitization of user input, particularly in the process description field.

When other users access this page, the injected JavaScript executes in their browsers, enabling attackers to hijack sessions and potentially take over user accounts.

The issue arises because the application fails to properly encode or sanitize user-controlled input, allowing arbitrary script execution.

This vulnerability is fixed in version 3.7.3 of WeGIA.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including session hijacking and account takeover.

  • Attackers can execute arbitrary JavaScript in the context of authenticated users.
  • Attackers can steal session cookies, allowing them to impersonate legitimate users.
  • Attackers can perform unauthorized actions on behalf of users.
  • Compromise of user accounts can lead to further unauthorized access and data breaches.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The Stored Cross-Site Scripting (XSS) vulnerability in WeGIA allows attackers to hijack user sessions and take over accounts by injecting malicious JavaScript. This can lead to unauthorized access to sensitive user data and actions performed without user consent.

Such unauthorized access and potential data breaches can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information, as well as ensuring user consent and data integrity.

Failure to address this vulnerability could result in violations of these regulations due to compromised confidentiality and integrity of user data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of malicious JavaScript payloads injected into the Processo de AceitaΓ§Γ£o page (html/atendido/processo_aceitacao.php). Specifically, look for suspicious input in the process description field, such as payloads like <img src=1 onerror=alert("XSS")>.

To detect exploitation attempts, you can monitor HTTP requests and responses for unusual script tags or event handlers in the process description field.

Commands to help detect this include:

  • Using grep or similar tools on server logs to find suspicious payloads: grep -i '<img src=1 onerror=' /path/to/weblog.log
  • Using curl or wget to fetch the Processo de AceitaΓ§Γ£o page and inspect the HTML for injected scripts: curl -s http://yourserver/html/atendido/processo_aceitacao.php | grep -i '<img src=1 onerror='
  • Using browser developer tools or automated scanners to check for stored XSS payloads executing on the page.

What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade the WeGIA application to version 3.7.3 or later, where the issue has been fixed.

Until the upgrade can be performed, restrict authenticated user input in the process description field to prevent injection of malicious scripts.

Additionally, apply input sanitization and output encoding on user-controlled fields to prevent execution of injected JavaScript.

Monitor user activity for suspicious behavior and consider temporarily limiting access to the Processo de AceitaΓ§Γ£o page if possible.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart