{"id":"CVE-2024-53470","details":"Multiple stored cross-site scripting (XSS) vulnerabilities in the component /configuracao/gateway_pagamento.php of WeGIA v3.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the id or name parameter.","modified":"2026-04-09T10:28:31.093760Z","published":"2024-12-05T16:15:25.743Z","references":[{"type":"WEB","url":"https://www.wegia.org"},{"type":"PACKAGE","url":"https://github.com/nilsonmori/WeGIA"},{"type":"EVIDENCE","url":"https://github.com/nmmorette/vulnerability-research/blob/main/CVE-2024-53470/README.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/labredescefetrj/wegia","events":[{"introduced":"0"},{"last_affected":"b61623a639441087e1eb0794df69d49122ec4c71"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.2.0"}]}}],"versions":["0.9.4-beta","v1.0","v2.0","v2.0-beta","v3.1","v3.2.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53470.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}