SB2026043091 - Multiple vulnerabilities in WeGIA
Published: April 30, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2025-57765)
The vulnerability allows a remote attacker to disclose sensitive information.
The vulnerability exists due to cross-site scripting in the pre_cadastro_adotante.php endpoint when processing the msg_e parameter in a crafted GET request. A remote attacker can inject a malicious script to disclose sensitive information.
User interaction is required to load the crafted request in a browser.
2) Cross-site scripting (CVE-ID: CVE-2025-57764)
The vulnerability allows a remote attacker to execute arbitrary script in the victim's browser.
The vulnerability exists due to cross-site scripting (XSS) in the cargos.php endpoint msg_e parameter when handling a crafted GET request. A remote attacker can send a specially crafted request to execute arbitrary script in the victim's browser.
User interaction is required to load the crafted request in a browser.
3) Cross-site scripting (CVE-ID: CVE-2025-57762)
The vulnerability allows a remote attacker to execute arbitrary script code in a victim's browser.
The vulnerability exists due to cross-site scripting (XSS) in the dependente_docdependente.php endpoint parameter nome when processing crafted POST requests. A remote attacker can submit a specially crafted nome parameter value to execute arbitrary script code in a victim's browser.
User interaction is required when a user accesses the affected page containing the stored payload.
4) Cross-site scripting (CVE-ID: CVE-2025-57763)
The vulnerability allows a remote attacker to execute arbitrary script in the victim's browser.
The vulnerability exists due to cross-site scripting (XSS) in the insere_despacho.php endpoint when handling the sccs parameter in GET requests. A remote attacker can send a specially crafted request to execute arbitrary script in the victim's browser.
User interaction is required for the crafted response to be rendered in a browser.
Remediation
Install update from vendor's website.
References
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-39r5-c63f-99mx
- https://github.com/advisories/GHSA-39r5-c63f-99mx
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qx7f-q867-cgx2
- https://github.com/advisories/GHSA-qx7f-q867-cgx2
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-494r-43f3-p828
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-67w3-jf96-f754