Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23730: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA

0
Medium
VulnerabilityCVE-2026-23730cvecve-2026-23730cwe-601
Published: Fri Jan 16 2026 (01/16/2026, 19:48:23 UTC)
Source: CVE Database V5
Vendor/Project: LabRedesCefetRJ
Product: WeGIA

Description

CVE-2026-23730 is an Open Redirect vulnerability in the WeGIA web management application used by charitable institutions. The flaw exists in versions prior to 3. 6. 2 within the /WeGIA/controle/control. php endpoint, specifically via the nextPage parameter when combined with certain query parameters. The application does not properly validate or restrict this parameter, allowing attackers to redirect users to arbitrary external sites. This can facilitate phishing, credential theft, malware distribution, and social engineering by exploiting the trusted WeGIA domain. The vulnerability has a medium severity score of 4. 8 and does not require authentication but does require user interaction. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 01/23/2026, 20:37:45 UTC

Technical Analysis

CVE-2026-23730 is classified as a CWE-601 Open Redirect vulnerability affecting the WeGIA web management system developed by LabRedesCefetRJ, primarily used by charitable institutions. The vulnerability is located in the /WeGIA/controle/control.php endpoint, where the nextPage parameter is used in conjunction with metodo=listarTodos and nomeClasse=ProdutoControle. The application fails to validate or restrict the nextPage parameter, allowing an attacker to craft URLs that redirect users to arbitrary external websites. This lack of validation means that an attacker can embed malicious URLs within links that appear to originate from the trusted WeGIA domain, increasing the likelihood of successful phishing or social engineering attacks. Exploitation does not require authentication but does require user interaction, such as clicking a malicious link. The CVSS v4.0 score is 4.8 (medium severity), reflecting the network attack vector, low complexity, no privileges required, but user interaction needed, and limited impact on confidentiality and integrity. Although no known exploits are currently reported in the wild, the vulnerability poses a risk for targeted phishing campaigns leveraging the trust in the WeGIA platform. The issue was addressed and fixed in version 3.6.2 of the software.

Potential Impact

For European organizations using WeGIA, particularly charitable institutions or NGOs, this vulnerability could be exploited to conduct phishing attacks that leverage the trusted WeGIA domain to deceive users into visiting malicious sites. This could lead to credential theft, malware infections, or social engineering attacks targeting employees, donors, or beneficiaries. The impact on confidentiality and integrity is limited but non-negligible due to potential credential compromise and subsequent lateral attacks. Availability is not directly affected. Given the nature of the affected organizations, reputational damage and loss of donor trust could be significant. The medium CVSS score reflects moderate risk, but the actual impact depends on the extent of WeGIA deployment and user awareness. Since exploitation requires user interaction, effective user training can reduce risk. However, the lack of input validation represents a systemic weakness that must be addressed to prevent misuse.

Mitigation Recommendations

European organizations using WeGIA should immediately upgrade to version 3.6.2 or later where the vulnerability is patched. Until the upgrade is applied, organizations should implement strict input validation and sanitization on the nextPage parameter at the web application firewall (WAF) or reverse proxy level to block URLs containing external redirects. Security teams should monitor logs for suspicious redirect attempts and educate users about the risks of clicking unexpected links, even if they appear to originate from trusted domains. Implementing Content Security Policy (CSP) headers can help mitigate the impact of redirected malicious content. Additionally, organizations should conduct phishing awareness campaigns tailored to the context of WeGIA usage. Regular vulnerability scanning and penetration testing should include checks for open redirect vulnerabilities. Finally, coordinate with the vendor for any interim patches or mitigations if upgrading is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-15T15:45:01.956Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696a96c8b22c7ad868e58b69

Added to database: 1/16/2026, 7:51:36 PM

Last enriched: 1/23/2026, 8:37:45 PM

Last updated: 2/7/2026, 11:41:22 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats