<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-4355</title><link>https://www.cvehunters.com/pt/p/cve-2026-4355/</link><description>Cross-Site Scripting (XSS) Armazenado</description><atom:link href="https://www.cvehunters.com/pt/p/cve-2026-4355/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-4355</title><link>https://www.cvehunters.com/pt/p/cve-2026-4355/</link><guid>https://www.cvehunters.com/pt/p/cve-2026-4355/</guid><description>&amp;lt;h2 id=&amp;#34;cve-2026-4355-cross-site-scripting-xss-armazenado-em-novo-da-função-educar_servidor_curso_lst-parâmetro-name&amp;#34;&amp;gt;CVE-2026-4355: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;educar_servidor_curso_lst&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;##Resumo&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; do aplicativo I-educar 2.11. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página `&amp;lt;code&amp;gt;CurricularComponent/view&amp;lt;/code&amp;gt;` é acessada pelos usuários, representando um risco de segurança significativo.
&amp;lt;p&amp;gt;##Detalhes&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2026-4355-cross-site-scripting-xss-armazenado-em-novo-da-função-educar_servidor_curso_lst-parâmetro-name&amp;#34;&amp;gt;CVE-2026-4355: Cross-Site Scripting (XSS) armazenado em Novo da função &amp;lt;code&amp;gt;educar_servidor_curso_lst&amp;lt;/code&amp;gt; parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Publicação CVE: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2026-4355&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;##Resumo&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;Uma vulnerabilidade de Cross-Site Scripting (XSS) armazenada foi identificada no endpoint &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt; do aplicativo I-educar 2.11. Essa vulnerabilidade permite que atacantes injetem scripts maliciosos no parâmetro &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;. Os scripts injetados são armazenados no servidor e executados automaticamente sempre que a página `&amp;lt;code&amp;gt;CurricularComponent/view&amp;lt;/code&amp;gt;` é acessada pelos usuários, representando um risco de segurança significativo.
&amp;lt;p&amp;gt;##Detalhes&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Endpoint vulnerável: &amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Parâmetro: &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;poc&amp;#34;&amp;gt;PoC
&amp;lt;/h2&amp;gt;&amp;lt;h3 id=&amp;#34;payload&amp;#34;&amp;gt;Payload
&amp;lt;/h3&amp;gt;&amp;lt;div class=&amp;#34;highlight&amp;#34;&amp;gt;&amp;lt;div class=&amp;#34;chroma&amp;#34;&amp;gt;
&amp;lt;table class=&amp;#34;lntable&amp;#34;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code&amp;gt;&amp;lt;span class=&amp;#34;lnt&amp;#34;&amp;gt;1
&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;
&amp;lt;td class=&amp;#34;lntd&amp;#34;&amp;gt;
&amp;lt;pre tabindex=&amp;#34;0&amp;#34; class=&amp;#34;chroma&amp;#34;&amp;gt;&amp;lt;code class=&amp;#34;language-fallback&amp;#34; data-lang=&amp;#34;fallback&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;line&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;cl&amp;#34;&amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(1)&amp;amp;lt;/script&amp;amp;gt;
&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/div&amp;gt;&amp;lt;h3 id=&amp;#34;passos-para-executar&amp;#34;&amp;gt;Passos para executar:
&amp;lt;/h3&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Registre o payload no campo `&amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt;` no endpoint `&amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;`.
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-4355/image.png&amp;#34;
width=&amp;#34;1655&amp;#34;
height=&amp;#34;336&amp;#34;
srcset=&amp;#34;/p/cve-2026-4355/image_hu_f0d344b2348566d2.png 480w, /p/cve-2026-4355/image_hu_6c0417b053954c44.png 1024w&amp;#34;
loading=&amp;#34;lazy&amp;#34;
class=&amp;#34;gallery-image&amp;#34;
data-flex-grow=&amp;#34;492&amp;#34;
data-flex-basis=&amp;#34;1182px&amp;#34;
/&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt; Depois disso, o XSS pode ser acionado abrindo o endpoint `&amp;lt;code&amp;gt;educar_servidor_curso_lst.php&amp;lt;/code&amp;gt;` correspondente ao nome editado. ID.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src=&amp;#34;/p/cve-2026-4355/image-1.png&amp;#34;
width=&amp;#34;1655&amp;#34;
height=&amp;#34;336&amp;#34;
srcset=&amp;#34;/p/cve-2026-4355/image-1_hu_304eccbb94dee2b4.png 480w, /p/cve-2026-4355/image-1_hu_6a7e07ce80a625ac.png 1024w&amp;#34;
loading=&amp;#34;lazy&amp;#34;
class=&amp;#34;gallery-image&amp;#34;
data-flex-grow=&amp;#34;492&amp;#34;
data-flex-basis=&amp;#34;1182px&amp;#34;
/&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impacto&amp;#34;&amp;gt;Impacto
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Sequestro de sessão: Roubo de cookies ou tokens de autenticação para se passar por outros usuários.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Roubo de credenciais: Coleta de nomes de usuário e senhas usando scripts maliciosos.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Distribuição de malware: Distribuição de código indesejado ou prejudicial às vítimas.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Elevação de privilégios: Comprometimento de usuários administrativos por meio de scripts persistentes.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Manipulação ou adulteração de dados: Alteração ou interrupção do conteúdo do site.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Danos à reputação: Erosão da confiança entre usuários e administradores do site.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;referência&amp;#34;&amp;gt;Referência
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/Saiipe/CVE/blob/main/i-educar%2FCVE-2026-4355.md&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://github.com/Saiipe/CVE/blob/main/i-educar%2FCVE-2026-4355.md&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;encontrado-por&amp;#34;&amp;gt;Encontrado por
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/itauan&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/itauan50x50.png&amp;#34;
loading=&amp;#34;lazy&amp;#34;
/&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/itauan&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;Itauan Santos&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Por: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;</content:encoded><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate></item></channel></rss>