<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-4355</title><link>https://www.cvehunters.com/p/cve-2026-4355/</link><description>Cross-Site Scripting (XSS) Stored</description><atom:link href="https://www.cvehunters.com/p/cve-2026-4355/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-4355</title><link>https://www.cvehunters.com/p/cve-2026-4355/</link><guid>https://www.cvehunters.com/p/cve-2026-4355/</guid><description>&amp;lt;h2 id=&amp;#34;cve-2026-4355-cross-site-scripting-xss-stored-in-new-educar_servidor_curso_lst-parameter-name&amp;#34;&amp;gt;CVE-2026-4355: Cross-Site Scripting (XSS) Stored in new &amp;lt;code&amp;gt;educar_servidor_curso_lst&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; endpoint of the I-educar 2.11 application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the &amp;lt;code&amp;gt;ComponenteCurricular/view&amp;lt;/code&amp;gt; page is accessed by users, representing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-4355-cross-site-scripting-xss-stored-in-new-educar_servidor_curso_lst-parameter-name&amp;#34;&amp;gt;CVE-2026-4355: Cross-Site Scripting (XSS) Stored in new &amp;lt;code&amp;gt;educar_servidor_curso_lst&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; endpoint of the I-educar 2.11 application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the &amp;lt;code&amp;gt;ComponenteCurricular/view&amp;lt;/code&amp;gt; page is accessed by users, representing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(1)&amp;amp;lt;/script&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Register the payload in the &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; field at the &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; endpoint.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-4355/image.png&amp;#34;
width=&amp;#34;1655&amp;#34;
height=&amp;#34;336&amp;#34;
srcset=&amp;#34;/p/cve-2026-4355/image_hu_f0d344b2348566d2.png 480w, /p/cve-2026-4355/image_hu_6c0417b053954c44.png 1024w&amp;#34;
loading=&amp;#34;lazy&amp;#34;
class=&amp;#34;gallery-image&amp;#34;
data-flex-grow=&amp;#34;492&amp;#34;
data-flex-basis=&amp;#34;1182px&amp;#34;
/&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; After that, the XSS can be triggered by opening the &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; endpoint corresponding to the edited ID.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-4355/image-1.png&amp;#34;
width=&amp;#34;1655&amp;#34;
height=&amp;#34;336&amp;#34;
srcset=&amp;#34;/p/cve-2026-4355/image-1_hu_304eccbb94dee2b4.png 480w, /p/cve-2026-4355/image-1_hu_6a7e07ce80a625ac.png 1024w&amp;#34;
loading=&amp;#34;lazy&amp;#34;
class=&amp;#34;gallery-image&amp;#34;
data-flex-grow=&amp;#34;492&amp;#34;
data-flex-basis=&amp;#34;1182px&amp;#34;
/&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Saiipe/CVE/blob/main/i-educar%2FCVE-2026-4355.md&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://github.com/Saiipe/CVE/blob/main/i-educar%2FCVE-2026-4355.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/itauan&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/itauan50x50.png&amp;#34;
loading=&amp;#34;lazy&amp;#34;
/&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/itauan&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;Itauan Santos&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;</content:encoded><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate></item></channel></rss>