Dismissed
Permalink
CVE-2026-23724
4.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
3 packages
- perlPackages.SnowballNorwegian
- perl538Packages.SnowballNorwegian
- perl540Packages.SnowballNorwegian
- @LeSuisse dismissed
WeGIA Stored Cross-Site Scripting (XSS) – atendido_idatendido Parameter on Occurrence Registration Page
WeGIA is a web manager for charitable institutions. Prior to 3.6.2, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the html/atendido/cadastro_ocorrencia.php endpoint of the WeGIA application. The application does not sanitize user-controlled data before rendering it inside the “Atendido” selection dropdown. This vulnerability is fixed in 3.6.2.
References
- https://github.com/LabRedesCefetRJ/WeGIA/pull/1333 x_refsource_MISC
- https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.2 x_refsource_MISC
- https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3r3q-8573-g3cq x_refsource_CONFIRM
Affected products
WeGIA
- ==< 3.6.2