CVE-2026-6990
projeto-siga novo cross site scripting
CVSS Score
3.5
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in projeto-siga siga 11.0.3.18. The affected element is an unknown function of the file /sigawf/app/responsavel/novo. Performing a manipulation of the argument Nome/Descrição results in cross site scripting. The attack can be initiated remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-79 CWE-94 |
| Vendor | projeto-siga |
| Product | siga |
| Published | Apr 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for projeto-siga siga
Be the first to know when new low vulnerabilities affecting projeto-siga siga are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
projeto-siga / siga
11.0.3.18
References
vuldb.com: https://vuldb.com/vuln/359542 vuldb.com: https://vuldb.com/vuln/359542/cti vuldb.com: https://vuldb.com/submit/796647 github.com: https://github.com/projeto-siga/siga/issues/2491 github.com: https://github.com/ViniCastro2001/Security_Reports/tree/main/siga/Stored-XSS-Responsavel github.com: https://github.com/projeto-siga/siga/
Credits
🔍 vini_castro (VulDB User) VulDB CNA Team