CVE-2026-23727: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA
CVE-2026-23727 is an Open Redirect vulnerability in the WeGIA web management application for charitable institutions, affecting versions prior to 3. 6. 2. The flaw exists in the /WeGIA/controle/control. php endpoint via the nextPage parameter when used with specific query parameters, allowing attackers to redirect users to arbitrary external sites. This can facilitate phishing, credential theft, malware distribution, and social engineering by exploiting the trust in the WeGIA domain. The vulnerability requires no authentication but does require user interaction to follow malicious links. It has a CVSS score of 4. 8 (medium severity) and has no known exploits in the wild. The issue is fixed in version 3.
AI Analysis
Technical Summary
CVE-2026-23727 is an Open Redirect vulnerability categorized under CWE-601 found in the LabRedesCefetRJ WeGIA application, a web management platform used by charitable institutions. The vulnerability affects versions prior to 3.6.2 and is located in the /WeGIA/controle/control.php endpoint. Specifically, the nextPage parameter, when combined with metodo=listarTodos and nomeClasse=TipoSaidaControle, is not properly validated or sanitized, allowing an attacker to craft URLs that redirect users to arbitrary external websites. This lack of validation means that an attacker can embed malicious URLs within seemingly legitimate WeGIA links, exploiting user trust in the domain. Such redirects can be leveraged for phishing campaigns, where users are tricked into entering credentials on fake sites, or for distributing malware and conducting social engineering attacks. The vulnerability does not require authentication but does require user interaction, such as clicking a malicious link. The CVSS v4.0 score of 4.8 reflects a medium severity, considering the network attack vector, low complexity, no privileges required, but user interaction needed. There are no known exploits in the wild at the time of publication. The vendor has addressed this vulnerability in version 3.6.2 by implementing proper validation and restrictions on the nextPage parameter to prevent open redirects.
Potential Impact
For European organizations using the WeGIA platform, particularly charitable institutions, this vulnerability poses a risk of phishing and social engineering attacks that can lead to credential compromise, unauthorized access, and potential malware infections. Since WeGIA is used to manage sensitive data related to charitable activities, exploitation could undermine trust in these organizations and disrupt their operations. Attackers could exploit the open redirect to bypass security filters and lure users into malicious sites, increasing the likelihood of successful attacks. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of credential theft and malware infection could lead to data breaches and operational disruptions. The medium severity rating suggests a moderate risk, but the impact could be significant if attackers target high-profile charitable organizations or leverage the trusted domain for large-scale phishing campaigns.
Mitigation Recommendations
European organizations using WeGIA should immediately upgrade to version 3.6.2 or later, where the vulnerability is fixed. Until the upgrade is applied, organizations should implement strict input validation and URL filtering on the nextPage parameter at the web application firewall (WAF) or reverse proxy level to block suspicious redirect attempts. Security teams should monitor web logs for unusual redirect patterns and educate users about the risks of clicking on unexpected links, especially those purporting to come from trusted WeGIA domains. Additionally, organizations should deploy anti-phishing tools and enable multi-factor authentication (MFA) to reduce the impact of credential theft. Regular vulnerability scanning and penetration testing focused on open redirect vectors can help identify residual risks. Finally, incident response plans should include procedures for handling phishing incidents stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2026-23727: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA
Description
CVE-2026-23727 is an Open Redirect vulnerability in the WeGIA web management application for charitable institutions, affecting versions prior to 3. 6. 2. The flaw exists in the /WeGIA/controle/control. php endpoint via the nextPage parameter when used with specific query parameters, allowing attackers to redirect users to arbitrary external sites. This can facilitate phishing, credential theft, malware distribution, and social engineering by exploiting the trust in the WeGIA domain. The vulnerability requires no authentication but does require user interaction to follow malicious links. It has a CVSS score of 4. 8 (medium severity) and has no known exploits in the wild. The issue is fixed in version 3.
AI-Powered Analysis
Technical Analysis
CVE-2026-23727 is an Open Redirect vulnerability categorized under CWE-601 found in the LabRedesCefetRJ WeGIA application, a web management platform used by charitable institutions. The vulnerability affects versions prior to 3.6.2 and is located in the /WeGIA/controle/control.php endpoint. Specifically, the nextPage parameter, when combined with metodo=listarTodos and nomeClasse=TipoSaidaControle, is not properly validated or sanitized, allowing an attacker to craft URLs that redirect users to arbitrary external websites. This lack of validation means that an attacker can embed malicious URLs within seemingly legitimate WeGIA links, exploiting user trust in the domain. Such redirects can be leveraged for phishing campaigns, where users are tricked into entering credentials on fake sites, or for distributing malware and conducting social engineering attacks. The vulnerability does not require authentication but does require user interaction, such as clicking a malicious link. The CVSS v4.0 score of 4.8 reflects a medium severity, considering the network attack vector, low complexity, no privileges required, but user interaction needed. There are no known exploits in the wild at the time of publication. The vendor has addressed this vulnerability in version 3.6.2 by implementing proper validation and restrictions on the nextPage parameter to prevent open redirects.
Potential Impact
For European organizations using the WeGIA platform, particularly charitable institutions, this vulnerability poses a risk of phishing and social engineering attacks that can lead to credential compromise, unauthorized access, and potential malware infections. Since WeGIA is used to manage sensitive data related to charitable activities, exploitation could undermine trust in these organizations and disrupt their operations. Attackers could exploit the open redirect to bypass security filters and lure users into malicious sites, increasing the likelihood of successful attacks. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of credential theft and malware infection could lead to data breaches and operational disruptions. The medium severity rating suggests a moderate risk, but the impact could be significant if attackers target high-profile charitable organizations or leverage the trusted domain for large-scale phishing campaigns.
Mitigation Recommendations
European organizations using WeGIA should immediately upgrade to version 3.6.2 or later, where the vulnerability is fixed. Until the upgrade is applied, organizations should implement strict input validation and URL filtering on the nextPage parameter at the web application firewall (WAF) or reverse proxy level to block suspicious redirect attempts. Security teams should monitor web logs for unusual redirect patterns and educate users about the risks of clicking on unexpected links, especially those purporting to come from trusted WeGIA domains. Additionally, organizations should deploy anti-phishing tools and enable multi-factor authentication (MFA) to reduce the impact of credential theft. Regular vulnerability scanning and penetration testing focused on open redirect vectors can help identify residual risks. Finally, incident response plans should include procedures for handling phishing incidents stemming from this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-15T15:45:01.956Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696a96c8b22c7ad868e58b6e
Added to database: 1/16/2026, 7:51:36 PM
Last enriched: 1/16/2026, 8:06:34 PM
Last updated: 1/16/2026, 11:49:33 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-5489
LowCVE-2025-5102
LowCVE-2024-8506
LowCVE-2024-8491
LowCVE-2026-23745: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in isaacs node-tar
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.