CVE-2025-10372: Cross Site Scripting in Portabilis i-Educar
A weakness has been identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_modulo_cad.php. This manipulation of the argument nm_tipo/descricao causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-10372 is a cross-site scripting vulnerability identified in the Portabilis i-Educar platform, a widely used open-source educational management system. The vulnerability resides in the /intranet/educar_modulo_cad.php file, specifically in the handling of the nm_tipo/descricao parameter. This parameter is improperly sanitized, allowing attackers to inject malicious JavaScript code. The attack vector is remote and does not require authentication, but successful exploitation depends on user interaction, such as clicking a maliciously crafted URL. The vulnerability can be exploited to execute arbitrary scripts in the context of the victim's browser session, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions within the application. The CVSS 4.0 base score is 5.1, reflecting medium severity due to the lack of required privileges but presence of user interaction. Although no active exploits have been reported in the wild, a proof-of-concept exploit has been publicly disclosed, increasing the risk of exploitation. The vulnerability affects all versions up to 2.10, indicating that organizations running older versions are at risk. The lack of vendor patches at the time of publication necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk of unauthorized access to user sessions and sensitive educational data. Exploitation could lead to compromised user credentials, unauthorized data manipulation, and potential disruption of educational services. The impact extends to data confidentiality and integrity, as attackers may steal personal information or alter records. Given the remote exploitability without authentication, attackers can target users via phishing or malicious links, increasing the attack surface. The medium severity suggests moderate risk, but the presence of a public exploit heightens urgency. Disruption in educational environments could affect operational continuity and trust. Additionally, compliance with GDPR mandates protection of personal data, and exploitation could lead to regulatory penalties. Therefore, European organizations must assess their exposure and implement mitigations promptly to avoid reputational and legal consequences.
Mitigation Recommendations
Organizations should immediately inventory their deployments of Portabilis i-Educar to identify affected versions up to 2.10. Although no official patches are currently listed, monitoring vendor communications for updates is critical. In the interim, implement strict input validation and output encoding on the nm_tipo/descricao parameter to neutralize malicious scripts. Deploy Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Educate users about phishing risks and the dangers of clicking unknown links. Employ web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable parameter. Regularly audit logs for suspicious activity related to the intranet module. Consider isolating the affected module or restricting access to trusted users until a patch is available. Finally, establish incident response plans to quickly address any exploitation attempts.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom
CVE-2025-10372: Cross Site Scripting in Portabilis i-Educar
Description
A weakness has been identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_modulo_cad.php. This manipulation of the argument nm_tipo/descricao causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10372 is a cross-site scripting vulnerability identified in the Portabilis i-Educar platform, a widely used open-source educational management system. The vulnerability resides in the /intranet/educar_modulo_cad.php file, specifically in the handling of the nm_tipo/descricao parameter. This parameter is improperly sanitized, allowing attackers to inject malicious JavaScript code. The attack vector is remote and does not require authentication, but successful exploitation depends on user interaction, such as clicking a maliciously crafted URL. The vulnerability can be exploited to execute arbitrary scripts in the context of the victim's browser session, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions within the application. The CVSS 4.0 base score is 5.1, reflecting medium severity due to the lack of required privileges but presence of user interaction. Although no active exploits have been reported in the wild, a proof-of-concept exploit has been publicly disclosed, increasing the risk of exploitation. The vulnerability affects all versions up to 2.10, indicating that organizations running older versions are at risk. The lack of vendor patches at the time of publication necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk of unauthorized access to user sessions and sensitive educational data. Exploitation could lead to compromised user credentials, unauthorized data manipulation, and potential disruption of educational services. The impact extends to data confidentiality and integrity, as attackers may steal personal information or alter records. Given the remote exploitability without authentication, attackers can target users via phishing or malicious links, increasing the attack surface. The medium severity suggests moderate risk, but the presence of a public exploit heightens urgency. Disruption in educational environments could affect operational continuity and trust. Additionally, compliance with GDPR mandates protection of personal data, and exploitation could lead to regulatory penalties. Therefore, European organizations must assess their exposure and implement mitigations promptly to avoid reputational and legal consequences.
Mitigation Recommendations
Organizations should immediately inventory their deployments of Portabilis i-Educar to identify affected versions up to 2.10. Although no official patches are currently listed, monitoring vendor communications for updates is critical. In the interim, implement strict input validation and output encoding on the nm_tipo/descricao parameter to neutralize malicious scripts. Deploy Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Educate users about phishing risks and the dangers of clicking unknown links. Employ web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable parameter. Regularly audit logs for suspicious activity related to the intranet module. Consider isolating the affected module or restricting access to trusted users until a patch is available. Finally, establish incident response plans to quickly address any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T14:26:45.735Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c5b4bee14ebf9f5cc7eca6
Added to database: 9/13/2025, 6:15:26 PM
Last enriched: 10/28/2025, 3:50:18 AM
Last updated: 10/29/2025, 9:29:24 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownCVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.