<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40286 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40286/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 21:16:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40286/feed.xml" rel="self" type="application/rss+xml"/><item><title>WeGIA Stored Cross-Site Scripting Vulnerability (CVE-2026-40286)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wegia-xss/</link><pubDate>Fri, 17 Apr 2026 21:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wegia-xss/</guid><description>A stored Cross-Site Scripting (XSS) vulnerability exists in WeGIA versions prior to 3.6.10, allowing attackers to inject malicious scripts into the 'Member Name' field during member registration, leading to persistent execution upon user access.</description><content:encoded><![CDATA[<p>WeGIA, a web manager for charitable institutions, is vulnerable to Stored Cross-Site Scripting (XSS) in versions prior to 3.6.10. The vulnerability, identified as CVE-2026-40286, resides in the &lsquo;Member Registration&rsquo; function, specifically the &lsquo;Member Name&rsquo; field. Attackers can inject malicious JavaScript code into this field. Because input is not properly validated and sanitized, the injected script is then stored in the application database.  Any user accessing the profile containing the malicious script will have the script executed in their browser.  This can lead to session hijacking, credential theft, or defacement. WeGIA version 3.6.10 addresses this vulnerability by implementing proper input sanitization. This vulnerability was reported on April 17, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable WeGIA instance running a version prior to 3.6.10.</li>
<li>The attacker accesses the &lsquo;Member Registration&rsquo; (Cadastrar Sócio) page.</li>
<li>In the &lsquo;Member Name&rsquo; (Nome Sócio) field, the attacker injects a malicious JavaScript payload (e.g., <code>&lt;script&gt;alert(&quot;XSS&quot;);&lt;/script&gt;</code>).</li>
<li>The attacker submits the registration form.</li>
<li>The WeGIA application stores the malicious payload in the database without proper sanitization.</li>
<li>A legitimate user navigates to a page displaying the compromised &lsquo;Member Name&rsquo; field, such as a member profile page.</li>
<li>The malicious JavaScript code is executed within the user&rsquo;s browser.</li>
<li>The attacker achieves their objective, such as stealing cookies or redirecting the user to a malicious website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability could lead to a range of consequences, including account compromise, data theft, and website defacement. An attacker could steal session cookies and impersonate legitimate users, gaining unauthorized access to sensitive information.  Due to the vulnerability residing in a web application, impact is limited to the users of the application, potentially exposing sensitive information and allowing threat actors the ability to modify the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WeGIA installations to version 3.6.10 or later to remediate CVE-2026-40286.</li>
<li>Implement input validation and sanitization on all user-supplied data, especially in the &lsquo;Member Name&rsquo; field, to prevent XSS attacks.</li>
<li>Deploy the Sigma rule <code>title: &quot;Detect WeGIA XSS Attempt via HTTP Request&quot;</code> to detect potential XSS payloads in HTTP requests.</li>
<li>Enable web server logging and monitor for suspicious activity, such as unusual characters or script tags in HTTP request parameters, to identify potential XSS attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>web-application</category><category>cve-2026-40286</category></item></channel></rss>