CVE-2026-23724

4.3 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in WeGIA web manager allows attackers to inject malicious scripts into the 'Atendido' selection dropdown. This affects all users of WeGIA versions prior to 3.6.2, potentially compromising user sessions and stealing sensitive data.

💻 Affected Systems

Products:
  • WeGIA
Versions: All versions prior to 3.6.2
Operating Systems: Any OS running WeGIA
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the html/atendido/cadastro_ocorrencia.php endpoint and requires user interaction with the affected dropdown.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, deface the application, or redirect users to malicious sites, potentially compromising the entire charitable institution's data.

🟠

Likely Case

Attackers inject malicious scripts that steal session cookies or credentials from users who interact with the vulnerable dropdown, leading to account compromise.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized, preventing any exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to have access to inject malicious payloads into the vulnerable field, which typically requires some level of authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.2

Vendor Advisory: https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3r3q-8573-g3cq

Restart Required: Yes

Instructions:

1. Download WeGIA version 3.6.2 from the official repository. 2. Backup your current installation and database. 3. Replace the existing files with the new version. 4. Restart the web server service.

🔧 Temporary Workarounds

Input Sanitization Filter

all

Implement server-side input validation and output encoding for the 'Atendido' dropdown field to neutralize malicious scripts.

Modify html/atendido/cadastro_ocorrencia.php to sanitize user input using htmlspecialchars() or similar functions

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with XSS protection rules to block malicious payloads.
  • Restrict access to the vulnerable endpoint using network segmentation or authentication controls.

🔍 How to Verify

Check if Vulnerable:

Check if the application version is below 3.6.2 and test the html/atendido/cadastro_ocorrencia.php endpoint with XSS payloads in the 'Atendido' dropdown.

Check Version:

Check the WeGIA version in the application interface or review the source code for version markers.

Verify Fix Applied:

After upgrading to 3.6.2, test the same endpoint with XSS payloads to confirm they are properly sanitized and do not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to cadastro_ocorrencia.php with script tags or JavaScript payloads
  • Multiple failed login attempts following suspicious requests

Network Indicators:

  • HTTP requests containing malicious script patterns in the 'Atendido' parameter

SIEM Query:

source="web_server_logs" AND uri="/html/atendido/cadastro_ocorrencia.php" AND (payload CONTAINS "<script>" OR payload CONTAINS "javascript:")

🔗 References

📤 Share & Export