WeGIA is a Web manager for charitable institutions. An Open Redirect vulnerability was identified in the `control.php` endpoint of versions up to and including 3.2.10 of the WeGIA application. The vulnerability allows the `nextPage` parameter to be manipulated, redirecting authenticated users to arbitrary external URLs without validation. The issue stems from the lack of validation for the `nextPage` parameter, which accepts external URLs as redirection destinations. This vulnerability can be exploited to perform phishing attacks or redirect users to malicious websites. Version 3.2.11 contains a fix for the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wegia
Wegia wegia |
|
CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wegia
Wegia wegia |
|
Metrics |
cvssV3_1
|
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 21 Jan 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeGIA is a Web manager for charitable institutions. An Open Redirect vulnerability was identified in the `control.php` endpoint of versions up to and including 3.2.10 of the WeGIA application. The vulnerability allows the `nextPage` parameter to be manipulated, redirecting authenticated users to arbitrary external URLs without validation. The issue stems from the lack of validation for the `nextPage` parameter, which accepts external URLs as redirection destinations. This vulnerability can be exploited to perform phishing attacks or redirect users to malicious websites. Version 3.2.11 contains a fix for the issue. | |
Title | WeGIA Open Redirect vulnerability | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T20:41:21.848Z
Reserved: 2025-01-16T17:31:06.459Z
Link: CVE-2025-24020

Updated: 2025-02-12T20:33:07.681Z

Status : Analyzed
Published: 2025-01-21T18:15:18.157
Modified: 2025-02-13T19:01:51.927
Link: CVE-2025-24020

No data.