CVE-2026-23728: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA
WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=DestinoControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2.
AI Analysis
Technical Summary
CVE-2026-23728 is an Open Redirect vulnerability identified in the LabRedesCefetRJ WeGIA application, a web management platform used by charitable institutions. The vulnerability resides in the /WeGIA/controle/control.php endpoint, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=DestinoControle. The application fails to properly validate or restrict the nextPage parameter, allowing attackers to craft URLs that redirect users to arbitrary external websites. This lack of validation enables attackers to exploit the trusted WeGIA domain to conduct phishing attacks, steal credentials, distribute malware, or perform social engineering. The vulnerability does not require authentication but does require user interaction, such as clicking a malicious link. The CVSS v4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N) reflects a network attack vector with low complexity, no authentication needed, but requiring user interaction, and limited impact on confidentiality and integrity. The vulnerability affects all versions prior to 3.6.2, where it has been fixed. No known exploits are currently reported in the wild. Given the nature of the vulnerability, attackers can leverage the trusted domain to increase the success rate of social engineering and phishing campaigns, potentially leading to credential compromise or malware infections.
Potential Impact
For European organizations using the WeGIA platform, this vulnerability poses a risk primarily through social engineering and phishing attacks that exploit the trusted WeGIA domain. Successful exploitation can lead to credential theft, unauthorized access, or malware infections, which can compromise organizational security and data integrity. Charitable institutions and NGOs, which often rely on trust and handle sensitive donor or beneficiary information, may face reputational damage and loss of stakeholder confidence if users are redirected to malicious sites. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of phishing and malware distribution can be severe. The medium CVSS score reflects moderate risk, but the impact can escalate if attackers combine this with other attack vectors. European organizations with limited cybersecurity awareness or outdated WeGIA versions are particularly vulnerable. Additionally, the exploitation could be leveraged in targeted campaigns against high-profile charitable organizations involved in sensitive or politically relevant activities within Europe.
Mitigation Recommendations
European organizations using WeGIA should immediately upgrade to version 3.6.2 or later, where this vulnerability is fixed. Until the update is applied, organizations should implement strict URL filtering and monitoring to detect and block suspicious redirect URLs originating from the WeGIA domain. Security awareness training should emphasize the risks of clicking on unexpected or suspicious links, especially those appearing to originate from trusted internal applications. Web application firewalls (WAFs) can be configured to detect and block requests with suspicious nextPage parameter values or unusual redirect patterns. Additionally, organizations should implement multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. Regular security assessments and penetration testing should include checks for open redirect vulnerabilities and other input validation issues. Finally, monitoring for phishing campaigns leveraging the WeGIA domain can help detect and respond to exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
CVE-2026-23728: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA
Description
WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=DestinoControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2.
AI-Powered Analysis
Technical Analysis
CVE-2026-23728 is an Open Redirect vulnerability identified in the LabRedesCefetRJ WeGIA application, a web management platform used by charitable institutions. The vulnerability resides in the /WeGIA/controle/control.php endpoint, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=DestinoControle. The application fails to properly validate or restrict the nextPage parameter, allowing attackers to craft URLs that redirect users to arbitrary external websites. This lack of validation enables attackers to exploit the trusted WeGIA domain to conduct phishing attacks, steal credentials, distribute malware, or perform social engineering. The vulnerability does not require authentication but does require user interaction, such as clicking a malicious link. The CVSS v4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N) reflects a network attack vector with low complexity, no authentication needed, but requiring user interaction, and limited impact on confidentiality and integrity. The vulnerability affects all versions prior to 3.6.2, where it has been fixed. No known exploits are currently reported in the wild. Given the nature of the vulnerability, attackers can leverage the trusted domain to increase the success rate of social engineering and phishing campaigns, potentially leading to credential compromise or malware infections.
Potential Impact
For European organizations using the WeGIA platform, this vulnerability poses a risk primarily through social engineering and phishing attacks that exploit the trusted WeGIA domain. Successful exploitation can lead to credential theft, unauthorized access, or malware infections, which can compromise organizational security and data integrity. Charitable institutions and NGOs, which often rely on trust and handle sensitive donor or beneficiary information, may face reputational damage and loss of stakeholder confidence if users are redirected to malicious sites. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences of phishing and malware distribution can be severe. The medium CVSS score reflects moderate risk, but the impact can escalate if attackers combine this with other attack vectors. European organizations with limited cybersecurity awareness or outdated WeGIA versions are particularly vulnerable. Additionally, the exploitation could be leveraged in targeted campaigns against high-profile charitable organizations involved in sensitive or politically relevant activities within Europe.
Mitigation Recommendations
European organizations using WeGIA should immediately upgrade to version 3.6.2 or later, where this vulnerability is fixed. Until the update is applied, organizations should implement strict URL filtering and monitoring to detect and block suspicious redirect URLs originating from the WeGIA domain. Security awareness training should emphasize the risks of clicking on unexpected or suspicious links, especially those appearing to originate from trusted internal applications. Web application firewalls (WAFs) can be configured to detect and block requests with suspicious nextPage parameter values or unusual redirect patterns. Additionally, organizations should implement multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. Regular security assessments and penetration testing should include checks for open redirect vulnerabilities and other input validation issues. Finally, monitoring for phishing campaigns leveraging the WeGIA domain can help detect and respond to exploitation attempts early.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-15T15:45:01.956Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696a96c8b22c7ad868e58b5f
Added to database: 1/16/2026, 7:51:36 PM
Last enriched: 1/16/2026, 8:07:08 PM
Last updated: 1/17/2026, 4:01:12 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0820: CWE-862 Missing Authorization in sweetdaisy86 RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress
MediumCVE-2026-0682: CWE-918 Server-Side Request Forgery (SSRF) in andy_moyle Church Admin
LowCVE-2025-14463: CWE-862 Missing Authorization in naa986 Payment Button for PayPal
MediumCVE-2025-13725: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in thimpress Thim Blocks
MediumCVE-2025-15403: CWE-269 Improper Privilege Management in metagauss RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.