- Description
 - WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_doacao.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the avulso parameter. This vulnerability is fixed in 3.2.8.
 - Source
 - security-advisories@github.com
 - NVD status
 - Analyzed
 - Products
 - wegia
 
CVSS 4.0
- Type
 - Secondary
 - Base score
 - 6.4
 - Impact score
 - -
 - Exploitability score
 - -
 - Vector string
 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
 - Severity
 - MEDIUM
 
CVSS 3.1
- Type
 - Secondary
 - Base score
 - 6.5
 - Impact score
 - 3.6
 - Exploitability score
 - 2.8
 - Vector string
 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
 - Severity
 - MEDIUM
 
- Hype score
 - Not currently trending
 
CVE Alert: CVE-2025-22600 - https://t.co/POE4YOw5we #OSINT #ThreatIntel #CyberSecurity #cve_2025_22600
@RedPacketSec
11 Jan 2025
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22600 Reflected XSS Vulnerability in WeGIA's configuracao_doacao.php Endpoint WeGIA is a tool for managing charities. There is a Reflected Cross-Site Scripting (XSS) issue in the configuracao_doacao.php ... https://t.co/EBKJm2X08S
@VulmonFeeds
10 Jan 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22600 WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_doacao.php endpoint of the… https://t.co/9UU42VjtKF
@CVEnew
10 Jan 2025
311 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "5DDD2AC7-FB66-4368-821D-B4BA30BD83D6",
            "versionEndExcluding": "3.2.8"
          }
        ],
        "operator": "OR"
      }
    ]
  }
]