Back to VulnFeed / CVE-2026-42871
root@hackertop:~/vulnfeed/CVE-2026-42871#
CVE-2026-42871 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

LabRedesCefetRJ WeGIA up to 3.6.x familiar_docfamiliar.php information disclosure

WeGIA 9d ago Impact pending confirmation
LIFECYCLE
5.1 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in LabRedesCefetRJ WeGIA up to 3.6.x. It has been declared as problematic. This vulnerability affects an unknown code block of the file atendido/familiar_docfamiliar.php. Upgrading to version 3.7.0 eliminates this vulnerability.
Root Cause Analysis
The CWE definition for the vulnerability is CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Impact: As an impact it is known to affect confidentiality.

Exploit: By approaching the search of inurl:atendido/familiar_docfamiliar.php it is possible to find vulnerable targets with Google Hacking.

Countermeasure: Upgrading to version 3.7.0 eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-42871 · CVSS 5.1 · Active Threat