<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-40284</title><link>https://www.cvehunters.com/p/cve-2026-40284/</link><description>Cross-Site Scripting (XSS) Stored</description><atom:link href="https://www.cvehunters.com/p/cve-2026-40284/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-40284</title><link>https://www.cvehunters.com/p/cve-2026-40284/</link><guid>https://www.cvehunters.com/p/cve-2026-40284/</guid><description>&amp;lt;h2 id=&amp;#34;cve-2026-40284-cross-site-scripting-xss-stored-in-listar_despachosphp&amp;#34;&amp;gt;CVE-2026-40284: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the “Destinatário” field. The payload is stored and later executed when viewing the dispatch page, impacting other users.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize or escape the “Destinatário” field, which is populated with user-controlled data (nome do usuário). When a despacho is created using a maliciously crafted name containing HTML/JavaScript, this value is stored in the system.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;During the rendering of the dispatch listing page, the application inserts this data into the DOM using .html(), causing the browser to interpret and execute the injected code.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This results in a Stored XSS vulnerability due to improper output encoding of user-controlled data.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-40284-cross-site-scripting-xss-stored-in-listar_despachosphp&amp;#34;&amp;gt;CVE-2026-40284: Cross-Site Scripting (XSS) Stored in &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the “Destinatário” field. The payload is stored and later executed when viewing the dispatch page, impacting other users.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The application fails to properly sanitize or escape the “Destinatário” field, which is populated with user-controlled data (nome do usuário). When a despacho is created using a maliciously crafted name containing HTML/JavaScript, this value is stored in the system.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;During the rendering of the dispatch listing page, the application inserts this data into the DOM using .html(), causing the browser to interpret and execute the injected code.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;This results in a Stored XSS vulnerability due to improper output encoding of user-controlled data.&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;1.&amp;lt;/b&amp;gt; Alter the name of a user (or create one) with the payload.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;2.&amp;lt;/b&amp;gt; Create a despacho selecting this user as “Destinatário”.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;3.&amp;lt;/b&amp;gt; Access the page that lists or displays the despacho.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;4.&amp;lt;/b&amp;gt; Observe that the payload is executed in the browser:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-40284/image.png&amp;#34;
width=&amp;#34;884&amp;#34;
height=&amp;#34;751&amp;#34;
srcset=&amp;#34;/p/cve-2026-40284/image_hu_b5a29259f27a9224.png 480w, /p/cve-2026-40284/image_hu_d02bb8cf295854e3.png 1024w&amp;#34;
loading=&amp;#34;lazy&amp;#34;
class=&amp;#34;gallery-image&amp;#34;
data-flex-grow=&amp;#34;117&amp;#34;
data-flex-basis=&amp;#34;282px&amp;#34;
/&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mccp-8446-phw5&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mccp-8446-phw5&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/thiago50x50.png&amp;#34;
loading=&amp;#34;lazy&amp;#34;
/&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;Thiago Escarrone&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;</content:encoded><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate></item></channel></rss>