🔐 CVE Alert

CVE-2026-6990

LOW 3.5

projeto-siga novo cross site scripting

CVSS Score
3.5
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in projeto-siga siga 11.0.3.18. The affected element is an unknown function of the file /sigawf/app/responsavel/novo. Performing a manipulation of the argument Nome/Descrição results in cross site scripting. The attack can be initiated remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-79 CWE-94
Vendor projeto-siga
Product siga
Published Apr 25, 2026
Stay Ahead of the Next One

Get instant alerts for projeto-siga siga

Be the first to know when new low vulnerabilities affecting projeto-siga siga are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

projeto-siga / siga
11.0.3.18

References

NVD ↗ CVE.org ↗ EPSS Data ↗
vuldb.com: https://vuldb.com/vuln/359542 vuldb.com: https://vuldb.com/vuln/359542/cti vuldb.com: https://vuldb.com/submit/796647 github.com: https://github.com/projeto-siga/siga/issues/2491 github.com: https://github.com/ViniCastro2001/Security_Reports/tree/main/siga/Stored-XSS-Responsavel github.com: https://github.com/projeto-siga/siga/

Credits

🔍 vini_castro (VulDB User) VulDB CNA Team