HomeWegiaCVE-2026-33135

CVE-2026-33135

CRITICAL
9.3CVSS
Published: 2026-03-20
Updated: 2026-03-20
AI Analysis

Description

WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, which is directly echoed into the HTML response without any sanitization or encoding. The script /html/memorando/novo_memorandoo.php reads HTTP GET parameters to display dynamic success messages to the user. At approximately line 273, the code checks if $_GET['msg'] equals 'success'. If true, it directly concatenates $_GET['sccs'] into an HTML alert <div> and outputs it to the browser. This issue has been fixed in version 3.6.7.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
changed
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-79

Metadata

Primary Vendor
WEGIA
Published
3/20/2026
Last Modified
3/20/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

wegia : wegia

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-33135 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com