<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-40282</title><link>https://www.cvehunters.com/pt/p/cve-2026-40282/</link><description>Cross-Site Scripting (XSS) Armazenado</description><atom:link href="https://www.cvehunters.com/pt/p/cve-2026-40282/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-40282</title><link>https://www.cvehunters.com/pt/p/cve-2026-40282/</link><guid>https://www.cvehunters.com/pt/p/cve-2026-40282/</guid><description>&amp;lt;h2 id=&amp;#34;cve-2026-40282-cross-site-scripting-xss-armazenado-em-novo-da-função-intercorrencia_visualizarphp&amp;#34;&amp;gt;CVE-2026-40282: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada permite que um usuário autenticado injete JavaScript malicioso na página de notificações do Intercorrências, o qual é executado quando o usuário acessa a página, possibilitando o sequestro de sessão e a tomada de controle da conta.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não higieniza ou codifica corretamente o campo de nome de usuário, que é exibido em notificações do sistema e aceita entrada controlada pelo usuário. Um atacante pode injetar HTML ou JavaScript malicioso neste campo ao criar ou modificar um usuário.&amp;lt;/br&amp;gt;Quando uma “intercorrência” é registrada, uma notificação é gerada. Ao clicar nesta notificação, o aplicativo renderiza o nome de usuário na interface sem o devido escape, fazendo com que qualquer código injetado seja executado no navegador.&amp;lt;/br&amp;gt;Este comportamento demonstra codificação de saída inadequada, resultando em uma vulnerabilidade de XSS armazenado.&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-40282-cross-site-scripting-xss-armazenado-em-novo-da-função-intercorrencia_visualizarphp&amp;#34;&amp;gt;CVE-2026-40282: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-40282&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;resumo&amp;#34;&amp;gt;Resumo
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada permite que um usuário autenticado injete JavaScript malicioso na página de notificações do Intercorrências, o qual é executado quando o usuário acessa a página, possibilitando o sequestro de sessão e a tomada de controle da conta.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;detalhes&amp;#34;&amp;gt;Detalhes
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;O aplicativo não higieniza ou codifica corretamente o campo de nome de usuário, que é exibido em notificações do sistema e aceita entrada controlada pelo usuário. Um atacante pode injetar HTML ou JavaScript malicioso neste campo ao criar ou modificar um usuário.&amp;lt;/br&amp;gt;Quando uma “intercorrência” é registrada, uma notificação é gerada. Ao clicar nesta notificação, o aplicativo renderiza o nome de usuário na interface sem o devido escape, fazendo com que qualquer código injetado seja executado no navegador.&amp;lt;/br&amp;gt;Este comportamento demonstra codificação de saída inadequada, resultando em uma vulnerabilidade de XSS armazenado.&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;intercorrencia_visualizar.php&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-html&amp;#34; data-lang=&amp;#34;html&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;lt;&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;nt&amp;#34;&amp;gt;img&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;src&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;1&amp;lt;/span&amp;gt; &amp;lt;span class=&amp;#34;na&amp;#34;&amp;gt;onerror&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;o&amp;#34;&amp;gt;=&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;s&amp;#34;&amp;gt;alert(&amp;amp;#34;XSS&amp;amp;#34;)&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;p&amp;#34;&amp;gt;&amp;amp;gt;&amp;lt;/span&amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-reproduzir&amp;#34;&amp;gt;Passos para reproduzir:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;&amp;lt;b&amp;gt;1.&amp;lt;/b&amp;gt; Cadastre um paciente onde o campo &amp;#34;Nome&amp;#34; ou &amp;#34;Sobrenome&amp;#34; contenha o payload.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;2.&amp;lt;/b&amp;gt; Adicione uma entrada de &amp;#34;Intercorrência&amp;#34; para este usuário.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;3.&amp;lt;/b&amp;gt; Navegue até a página de notificações &amp;#34;Intercorrências&amp;#34; e clique em &amp;#34;Recentes&amp;#34; e &amp;#34;Histórico&amp;#34;. Esta vulnerabilidade afeta ambas as páginas.&amp;lt;/br&amp;gt;&amp;lt;/br&amp;gt;&amp;lt;b&amp;gt;4.&amp;lt;/b&amp;gt; Observe que o payload é executado no navegador:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-40282/image.png&amp;#34;
width=&amp;#34;603&amp;#34;
height=&amp;#34;330&amp;#34;
srcset=&amp;#34;/p/cve-2026-40282/image_hu_dfc5bc911aa9fe3a.png 480w, /p/cve-2026-40282/image_hu_581b1a4709b48d43.png 1024w&amp;#34;
loading=&amp;#34;lazy&amp;#34;
class=&amp;#34;gallery-image&amp;#34;
data-flex-grow=&amp;#34;182&amp;#34;
data-flex-basis=&amp;#34;438px&amp;#34;
/&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-r6h8-7vxv-q8pp&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-r6h8-7vxv-q8pp&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/thiago50x50.png&amp;#34;
loading=&amp;#34;lazy&amp;#34;
/&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://br.linkedin.com/in/thiagoescarrone&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;Thiago Escarrone&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;</content:encoded><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate></item></channel></rss>