WeGIA Web Manager: Stored XSS Puts Charitable Institutions at Risk

WeGIA Web Manager: Stored XSS Puts Charitable Institutions at Risk

The National Vulnerability Database has disclosed CVE-2026-40286, a high-severity (CVSS 7.5) Stored Cross-Site Scripting (XSS) vulnerability in WeGIA, a web manager for charitable institutions. Prior to version 3.6.10, an attacker could inject a malicious payload into the ‘Member Name’ field during ‘Member Registration’. This script is then persistently stored in the database and executed whenever a user navigates to specific URLs within the application.

This isn’t just a minor annoyance; it’s a direct path to session hijacking, data exfiltration, or even full administrative control if an admin user is targeted. For charitable organizations, this means potential reputational damage, financial loss, and a breach of trust with their members. The attacker’s calculus is straightforward: target an application often used by less technically sophisticated users, leverage a common web vulnerability, and gain persistent access to sensitive data or control.

Defenders must prioritize patching. The fix is available in WeGIA version 3.6.10. Beyond patching, organizations using WeGIA should review their web application firewall (WAF) configurations to ensure robust XSS protection and consider implementing Content Security Policy (CSP) headers to mitigate similar client-side injection risks proactively.

What This Means For You

  • If your organization uses WeGIA, you need to check your version immediately. Patch to 3.6.10 or later without delay. Review your web application logs for any suspicious activity related to member registration or unusual script executions, as this vulnerability allows for persistent code injection.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-40286 - WeGIA Member Registration Stored XSS Attempt

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40286 XSS WeGIA versions prior to 3.6.10
CVE-2026-40286 XSS Vulnerable function: 'Member Registration' (Cadastrar Sócio)
CVE-2026-40286 XSS Vulnerable field: 'Member Name' (Nome Sócio)
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 18, 2026 at 00:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

Critical Thymeleaf Vulnerability Bypasses Injection Protections

CVE-2026-40478 — Thymeleaf is a server-side Java template engine for web and standalone environments. Versions 3.1.3.RELEASE and prior contain a security bypass vulnerability in the...

vulnerabilityCVEcriticalhigh-severitycwe-917cwe-1336
/SCW Vulnerability Desk /CRITICAL /⚑ 3 IOCs /⚙ 3 Sigma

Critical Thymeleaf Vulnerability Bypasses Injection Protections

CVE-2026-40477 — Thymeleaf is a server-side Java template engine for web and standalone environments. Versions 3.1.3.RELEASE and prior contain a security bypass vulnerability in the...

vulnerabilityCVEcriticalhigh-severitycwe-917cwe-1336
/SCW Vulnerability Desk /CRITICAL /⚑ 3 IOCs /⚙ 3 Sigma

wger Fitness Manager: Auth Bypass Grants Global Config Control

CVE-2026-40474 — wger is a free, open-source workout and fitness manager. In versions 2.5 and below, the GymConfigUpdateView declares permission_required = 'config.change_gymconfig' but inherits WgerFormMixin...

vulnerabilityCVEhigh-severityprivilege-escalationcwe-284cwe-862
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs /⚙ 3 Sigma