Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23725: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LabRedesCefetRJ WeGIA

0
Medium
VulnerabilityCVE-2026-23725cvecve-2026-23725cwe-79
Published: Fri Jan 16 2026 (01/16/2026, 19:38:27 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

CVE-2026-23725 is a stored Cross-Site Scripting (XSS) vulnerability in versions of the WeGIA web management application prior to 3. 6. 2. The flaw exists in the html/pet/adotantes/cadastro_adotante. php and informacao_adotantes. php endpoints where user input is not properly sanitized before being rendered, allowing persistent injection of malicious JavaScript. Any user visiting the affected pages will automatically execute the injected script, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS 4. 0 base score of 5. 3, indicating medium severity.

AI-Powered Analysis

AILast updated: 01/23/2026, 20:36:39 UTC

Technical Analysis

The vulnerability CVE-2026-23725 affects the WeGIA web management system developed by LabRedesCefetRJ, specifically versions prior to 3.6.2. It is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, arising from improper neutralization of user input during web page generation. The affected endpoints, html/pet/adotantes/cadastro_adotante.php and html/pet/adotantes/informacao_adotantes.php, fail to sanitize user-supplied data before embedding it into the Adopters Information table. This allows an attacker to inject persistent malicious JavaScript code that executes automatically when any user accesses these pages. The attack vector is network-based with low attack complexity and does not require privileges or authentication, but does require the victim to visit the compromised page (user interaction). The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions performed in the context of the victim's browser session. The CVSS 4.0 score of 5.3 reflects a medium severity, with limited scope and no known exploits in the wild. The issue is resolved in WeGIA version 3.6.2 by implementing proper input sanitization and output encoding to neutralize malicious scripts. Organizations using WeGIA should apply this update promptly to prevent exploitation.

Potential Impact

For European organizations, especially charitable institutions using the WeGIA platform, this vulnerability poses a risk of client-side attacks that could compromise user sessions, steal sensitive information, or deface web content. Given that the vulnerability allows persistent JavaScript injection, attackers could target donors, volunteers, or staff accessing the affected pages, potentially leading to phishing, credential theft, or unauthorized actions performed under the victim's identity. This could damage organizational reputation, lead to data breaches, and disrupt operations. Although no known exploits are reported, the ease of exploitation and the public availability of the vulnerability increase the risk of future attacks. The impact is more pronounced for organizations with high web traffic or those handling sensitive personal data through the affected endpoints. Additionally, regulatory compliance under GDPR mandates protection of personal data, and exploitation of this vulnerability could result in violations and penalties.

Mitigation Recommendations

1. Immediate upgrade of WeGIA installations to version 3.6.2 or later, where the vulnerability is fixed. 2. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the affected endpoints, focusing on typical XSS attack patterns. 3. Conduct regular security audits and code reviews to ensure proper input validation and output encoding practices are enforced beyond the patched version. 4. Educate users and administrators about the risks of XSS and encourage cautious behavior when interacting with web content. 5. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing the application. 6. Monitor logs for unusual activity or repeated access to the vulnerable endpoints that could indicate exploitation attempts. 7. If upgrading immediately is not feasible, consider temporarily disabling or restricting access to the affected pages to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-15T15:45:01.956Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696a96c8b22c7ad868e58b78

Added to database: 1/16/2026, 7:51:36 PM

Last enriched: 1/23/2026, 8:36:39 PM

Last updated: 2/7/2026, 2:46:18 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats