Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wegia
Wegia wegia |
|
| CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wegia
Wegia wegia |
|
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Labredescefetrj
Labredescefetrj wegia |
|
| Vendors & Products |
Labredescefetrj
Labredescefetrj wegia |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9. | |
| Title | WeGIA - Open Redirect - backup redirection — Unvalidated $_GET['redirect'] | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T13:40:11.583Z
Reserved: 2026-04-02T20:49:44.453Z
Link: CVE-2026-35475
Updated: 2026-04-07T13:39:56.951Z
Status : Analyzed
Published: 2026-04-06T22:16:24.340
Modified: 2026-04-10T20:18:42.237
Link: CVE-2026-35475
No data.
OpenCVE Enrichment
Updated: 2026-04-13T14:27:34Z