CVE-2026-33135
WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novomemorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, which is directly echoed into the HTML response without any sanitization or encoding. The script /html/memorando/novomemorandoo.php reads HTTP GET parameters to display dynamic success messages to the user. At approximately line 273, the code checks if $GET['msg'] equals 'success'. If true, it directly concatenates $GET['sccs'] into an HTML alert <div> and outputs it to the browser. This issue has been fixed in version 3.6.7.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/LabRedesCefetRJ/WeGIA/releases/tag/3.6.7, https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33135.json, https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w5rv-5884-w94v, https://nvd.nist.gov/vuln/detail/CVE-2026-33135, https://github.com/LabRedesCefetRJ/WeGIA/pull/1459
