WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, which is directly echoed into the HTML response without any sanitization or encoding. The script /html/memorando/novo_memorandoo.php reads HTTP GET parameters to display dynamic success messages to the user. At approximately line 273, the code checks if $_GET['msg'] equals 'success'. If true, it directly concatenates $_GET['sccs'] into an HTML alert <div> and outputs it to the browser. This issue has been fixed in version 3.6.7.
References
| Link | Resource |
|---|---|
| https://github.com/LabRedesCefetRJ/WeGIA/pull/1459 | Issue Tracking Patch |
| https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7 | Release Notes |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w5rv-5884-w94v | Exploit Vendor Advisory |
| https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w5rv-5884-w94v | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 11:18
Updated : 2026-03-20 19:25
NVD link : CVE-2026-33135
Mitre link : CVE-2026-33135
CVE.ORG link : CVE-2026-33135
JSON object : View
Products Affected
wegia
- wegia
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
