Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23728: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA

0
Medium
VulnerabilityCVE-2026-23728cvecve-2026-23728cwe-601
Published: Fri Jan 16 2026 (01/16/2026, 19:46:07 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=DestinoControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2.

AI-Powered Analysis

AILast updated: 01/16/2026, 20:07:08 UTC

Technical Analysis

CVE-2026-23728 is an Open Redirect vulnerability identified in the LabRedesCefetRJ WeGIA application, a web management platform used by charitable institutions. The vulnerability resides in the /WeGIA/controle/control.php endpoint, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=DestinoControle. The application fails to properly validate or restrict the nextPage parameter, allowing attackers to craft URLs that redirect users to arbitrary external websites. This lack of validation enables attackers to exploit the trusted WeGIA domain to conduct phishing attacks, steal credentials, distribute malware, or perform social engineering. The vulnerability does not require authentication but does require user interaction, such as clicking a malicious link. The CVSS v4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N) reflects a network attack vector with low complexity, no authentication needed, but requiring user interaction, and limited impact on confidentiality and integrity. The vulnerability affects all versions prior to 3.6.2, where it has been fixed. No known exploits are currently reported in the wild. Given the nature of the vulnerability, attackers can leverage the trusted domain to increase the success rate of social engineering and phishing campaigns, potentially leading to credential compromise or malware infections.

Potential Impact

For European organizations using the WeGIA platform, this vulnerability poses a risk primarily through social engineering and phishing attacks that exploit the trusted WeGIA domain. Successful exploitation can lead to credential theft, unauthorized access, or malware infections, which can compromise organizational security and data integrity. Charitable institutions and NGOs, which often rely on trust and handle sensitive donor or beneficiary information, may face reputational damage and loss of stakeholder confidence if users are redirected to malicious sites. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of phishing and malware distribution can be severe. The medium CVSS score reflects moderate risk, but the impact can escalate if attackers combine this with other attack vectors. European organizations with limited cybersecurity awareness or outdated WeGIA versions are particularly vulnerable. Additionally, the exploitation could be leveraged in targeted campaigns against high-profile charitable organizations involved in sensitive or politically relevant activities within Europe.

Mitigation Recommendations

European organizations using WeGIA should immediately upgrade to version 3.6.2 or later, where this vulnerability is fixed. Until the update is applied, organizations should implement strict URL filtering and monitoring to detect and block suspicious redirect URLs originating from the WeGIA domain. Security awareness training should emphasize the risks of clicking on unexpected or suspicious links, especially those appearing to originate from trusted internal applications. Web application firewalls (WAFs) can be configured to detect and block requests with suspicious nextPage parameter values or unusual redirect patterns. Additionally, organizations should implement multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. Regular security assessments and penetration testing should include checks for open redirect vulnerabilities and other input validation issues. Finally, monitoring for phishing campaigns leveraging the WeGIA domain can help detect and respond to exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-15T15:45:01.956Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696a96c8b22c7ad868e58b5f

Added to database: 1/16/2026, 7:51:36 PM

Last enriched: 1/16/2026, 8:07:08 PM

Last updated: 1/17/2026, 4:01:12 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats