Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23729: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA

0
Medium
VulnerabilityCVE-2026-23729cvecve-2026-23729cwe-601
Published: Fri Jan 16 2026 (01/16/2026, 19:47:10 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarDescricao and nomeClasse=ProdutoControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.2.

AI-Powered Analysis

AILast updated: 01/16/2026, 20:06:53 UTC

Technical Analysis

CVE-2026-23729 is an Open Redirect vulnerability classified under CWE-601 found in the WeGIA web management software developed by LabRedesCefetRJ, used primarily by charitable institutions. The vulnerability resides in the /WeGIA/controle/control.php endpoint, specifically in the handling of the nextPage parameter when combined with metodo=listarDescricao and nomeClasse=ProdutoControle. The application fails to properly validate or restrict the nextPage parameter, allowing an attacker to craft URLs that redirect users to arbitrary external websites. This flaw can be exploited by attackers to conduct phishing campaigns, steal credentials, distribute malware, or perform social engineering attacks by leveraging the trust users place in the legitimate WeGIA domain. The vulnerability does not require authentication but does require user interaction, such as clicking a malicious link. The CVSS 4.0 vector indicates the attack can be performed remotely with low complexity, no privileges, and no user authentication, but user interaction is required. The impact on confidentiality and integrity is low, but the potential for social engineering and indirect compromise is significant. The vulnerability is fixed in WeGIA version 3.6.2, and no public exploits are currently known.

Potential Impact

For European organizations using WeGIA, especially charitable institutions, this vulnerability poses a risk of phishing and social engineering attacks that could lead to credential theft or malware infections. Since WeGIA is a trusted platform within these organizations, attackers can exploit the open redirect to craft convincing malicious links that appear to originate from a legitimate source, increasing the likelihood of successful attacks. This can result in compromised user accounts, unauthorized access to sensitive data, and potential reputational damage. Although the vulnerability itself does not directly allow system compromise, the indirect consequences through user deception can be significant. The medium CVSS score reflects the moderate technical severity but notable social engineering risk. Organizations relying on WeGIA should be aware that attackers might target their users via email or other communication channels leveraging this flaw.

Mitigation Recommendations

European organizations should immediately upgrade WeGIA to version 3.6.2 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement web application firewall (WAF) rules to detect and block suspicious requests containing manipulated nextPage parameters. Security teams should educate users about the risks of clicking on unexpected links, even if they appear to come from trusted domains. Monitoring logs for unusual redirect patterns or spikes in outbound traffic to unknown domains can help detect exploitation attempts. Additionally, organizations should consider implementing URL filtering and anti-phishing solutions to reduce the risk of successful attacks leveraging this vulnerability. Regular vulnerability scanning and patch management processes should be enforced to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-15T15:45:01.956Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696a96c8b22c7ad868e58b64

Added to database: 1/16/2026, 7:51:36 PM

Last enriched: 1/16/2026, 8:06:53 PM

Last updated: 1/17/2026, 4:01:37 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats