Featured image of post CVE-2025-30366

CVE-2025-30366

Cross-Site Scripting (XSS) Stored

CVE-2025-30366: Multiples Stored XSS in personalizacao.php

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-30366

Summary

Multiples stored Cross-Site Scripting (XSS) vulnerability was identified in the WeGIA application. This vulnerability allows unauthorized scripts to be executed within the user's browser context. Stored XSS is particularly critical, as the malicious code is permanently stored on the server and executed whenever a compromised page is loaded, affecting all users accessing this page.

https://github.com/LabRedesCefetRJ/WeGIA/security

Details

Vulnerable Endpoint: html/personalizacao.php

Parameters: Titulo, Subtitulo, Conheça, Objetivo, Rodape

POC

To reproduce the issue, insert the following payloads into the vulnerable field of the URL and save the changes:

1
  <script>alert('Alert: XSS');</script>

After saving the input, the injected script will be stored on the server and automatically executed for any user accessing the home page and personalizacao.php, confirming the stored XSS.

File: html/personalizacao.php

Payload:

1
  <script>alert('Alert: XSS');</script>

Trigger in: Home Page and personalizacao.php

Parameters: titulo, subtitulo, conheça, objetivo, rodape

Impact

All users accessing the affected pages (home page and personalizacao.php), as the malicious script is stored on the server and executed automatically in their browsers.

Administrators who interact with the vulnerable fields may also be affected, potentially leading to account takeover if sensitive cookies or session tokens are stolen.

The application itself, as attackers can use XSS to deface content, redirect users, or perform actions on behalf of authenticated users.

Reference

https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pwr9-fr8r-8h48

Reporter

Natan Maia Morette

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy