Vulnerability Description
WeGIA is a web manager for charitable institutions. Prior to 3.6.2, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the html/atendido/cadastro_ocorrencia.php endpoint of the WeGIA application. The application does not sanitize user-controlled data before rendering it inside the “Atendido” selection dropdown. This vulnerability is fixed in 3.6.2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wegia | Wegia | < 3.6.2 |
Related Weaknesses (CWE)
References
- https://github.com/LabRedesCefetRJ/WeGIA/pull/1333Issue TrackingPatch
- https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2Release Notes
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3r3q-8573-g3cqExploitVendor Advisory
FAQ
What is CVE-2026-23724?
CVE-2026-23724 is a vulnerability with a CVSS score of 4.3 (MEDIUM). WeGIA is a web manager for charitable institutions. Prior to 3.6.2, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the html/atendido/cadastro_ocorrencia.php endpoint of the WeGIA ...
How severe is CVE-2026-23724?
CVE-2026-23724 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23724?
Check the references section above for vendor advisories and patch information. Affected products include: Wegia Wegia.