CVE-2026-23725
📋 TL;DR
A stored cross-site scripting (XSS) vulnerability in WeGIA web manager allows attackers to inject malicious JavaScript into the adopters information table. Any user visiting the affected pages will automatically execute the injected payload. This affects all WeGIA installations prior to version 3.6.2.
💻 Affected Systems
- WeGIA
📦 What is this software?
Wegia by Wegia
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.
Likely Case
Session hijacking, credential theft, or defacement of the adopters information pages.
If Mitigated
Limited impact with proper input validation and output encoding in place.
🎯 Exploit Status
Exploitation requires ability to submit data to affected endpoints, but payload execution is automatic for all visitors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.6.2
Vendor Advisory: https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-c85q-4fwg-99gw
Restart Required: No
Instructions:
1. Download WeGIA 3.6.2 from GitHub releases. 2. Backup current installation. 3. Replace affected files with patched versions. 4. Verify functionality.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize user input before processing.
Not applicable - requires code modification
Content Security Policy
allImplement CSP headers to restrict script execution sources.
Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Header set X-Content-Type-Options "nosniff"
🧯 If You Can't Patch
- Disable or restrict access to affected endpoints (/html/pet/adotantes/cadastro_adotante.php and /html/pet/adotantes/informacao_adotantes.php)
- Implement web application firewall (WAF) rules to block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Check if version is below 3.6.2 and test for XSS payload injection in adopters information fields.
Check Version:
Check WeGIA configuration files or admin panel for version information
Verify Fix Applied:
Verify version is 3.6.2 or higher and test that XSS payloads are properly sanitized in output.
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript in form submissions
- Multiple requests to adopters endpoints with script tags
Network Indicators:
- HTTP requests containing script tags or JavaScript payloads to affected endpoints
SIEM Query:
source="web_logs" AND (uri="/html/pet/adotantes/cadastro_adotante.php" OR uri="/html/pet/adotantes/informacao_adotantes.php") AND (content="<script>" OR content="javascript:")