<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>CVE-2026-6990</title>
    <link>https://www.cvehunters.com/p/cve-2026-6990/</link>
    <description>Cross-Site Scripting (XSS) Stored</description>
    <atom:link href="https://www.cvehunters.com/p/cve-2026-6990/index.xml" rel="self" type="application/rss+xml"/>

    <item>
      <title>CVE-2026-6990</title>
      <link>https://www.cvehunters.com/p/cve-2026-6990/</link>
      <guid>https://www.cvehunters.com/p/cve-2026-6990/</guid>
      <description>&amp;lt;h2 id=&amp;#34;cve-2026-6990-cross-site-scripting-xss-stored-in-new-sigawfappresponsavelnovo-parameter-descrição&amp;#34;&amp;gt;CVE-2026-6990: Cross-Site Scripting (XSS) Stored in new &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; endpoint of the SIGA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt; page is accessed by users, representing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-6990-cross-site-scripting-xss-stored-in-new-sigawfappresponsavelnovo-parameter-descrição&amp;#34;&amp;gt;CVE-2026-6990: Cross-Site Scripting (XSS) Stored in new &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; parameter &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A Stored Cross-Site Scripting (XSS) vulnerability was identified in the &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; endpoint of the SIGA application. This vulnerability allows attackers to inject malicious scripts into the &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; parameter. The injected scripts are stored on the server and executed automatically whenever the &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt; page is accessed by users, representing a significant security risk.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;details&amp;#34;&amp;gt;Details
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Vulnerable Endpoint: &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parameter: &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(document.cookie)//&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;steps-to-reproduce&amp;#34;&amp;gt;Steps to Reproduce:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Register the payload in the &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; field at the &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; endpoint.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-6990/image.png&amp;#34;
	width=&amp;#34;924&amp;#34;
	height=&amp;#34;266&amp;#34;
	srcset=&amp;#34;/p/cve-2026-6990/image_hu_257390f57da3ef36.png 480w, /p/cve-2026-6990/image_hu_e31e27a952009eca.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;347&amp;#34;
		data-flex-basis=&amp;#34;833px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; After that, the XSS can be triggered by opening the &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt; endpoint.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-6990/image-1.png&amp;#34;
	width=&amp;#34;478&amp;#34;
	height=&amp;#34;164&amp;#34;
	srcset=&amp;#34;/p/cve-2026-6990/image-1_hu_4ede61fcf518e8ab.png 480w, /p/cve-2026-6990/image-1_hu_6277af4afca73498.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;291&amp;#34;
		data-flex-basis=&amp;#34;699px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/ViniCastro2001/Security_Reports/tree/main/siga/Stored-XSS-Responsavel&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/ViniCastro2001/Security_Reports/tree/main/siga/Stored-XSS-Responsavel&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/viniciusCastro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vinicius Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>

      <pubDate>Sat, 25 Apr 2026 00:00:00 &#43;0000</pubDate>
    </item>
  </channel>
</rss>
