Key Information Vulnerability Overview CVE ID: CVE-2025-8545 Vulnerability Type: Stored Cross-Site Scripting (XSS) Affected File: educar_motivo_afastamento_cad.php Parameter: nm_motivo Vulnerability Details Vulnerable Endpoint: /intranet/educar_motivo_afastamento_cad.php Trigger Page: /intranet/educar_motivo_afastamento_lst.php Description: The application fails to properly validate and sanitize user input in the parameter, allowing attackers to inject malicious scripts that are stored on the server. When the affected page is accessed, the malicious script executes automatically in the victim's browser. Proof of Concept (PoC) Steps: 1. Access the vulnerable endpoint. 2. Select the default option in the first field. 3. Insert the payload in the second field. 4. Click the "Salvar" button. 5. The trigger page will activate automatically. Payload Example: Impact Session Cookie Theft: Attackers can steal session cookies to hijack user sessions and perform actions on their behalf. Malware Download: Attackers can trick users into downloading and installing malware on their computers. Browser Hijacking: Attackers can hijack the user’s browser or deliver browser-based exploits. Credential Theft: Attackers can steal user credentials. Sensitive Information Disclosure: Attackers can access sensitive information stored in user accounts or browsers. Website Defacement: Attackers can alter website content to deface the site. User Misdirection: Attackers can modify instructions provided by the target website to mislead user behavior. Reputation Damage: Attackers can damage the organization’s reputation by defacing corporate websites or spreading false information. References CVE VulnDB Discoverer Karina Gante, Official CVE-Hunters Member