Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wegia
Wegia wegia |
|
| CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wegia
Wegia wegia |
|
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labredescefetrj
Labredescefetrj wegia |
|
| Vendors & Products |
Labredescefetrj
Labredescefetrj wegia |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, open redirect has been found in WeGIA webapp. The redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9. | |
| Title | WeGIA - Open Redirect - atualizacao redirection - Unvalidated $_GET['redirect'] | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T15:59:13.467Z
Reserved: 2026-04-02T20:49:44.453Z
Link: CVE-2026-35474
Updated: 2026-04-07T15:16:27.903Z
Status : Analyzed
Published: 2026-04-06T22:16:24.200
Modified: 2026-04-10T20:24:16.393
Link: CVE-2026-35474
No data.
OpenCVE Enrichment
Updated: 2026-04-13T14:27:35Z