Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10372: Cross Site Scripting in Portabilis i-Educar

0
Medium
VulnerabilityCVE-2025-10372cvecve-2025-10372
Published: Sat Sep 13 2025 (09/13/2025, 18:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A weakness has been identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_modulo_cad.php. This manipulation of the argument nm_tipo/descricao causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 10/28/2025, 03:50:18 UTC

Technical Analysis

CVE-2025-10372 is a cross-site scripting vulnerability identified in the Portabilis i-Educar platform, a widely used open-source educational management system. The vulnerability resides in the /intranet/educar_modulo_cad.php file, specifically in the handling of the nm_tipo/descricao parameter. This parameter is improperly sanitized, allowing attackers to inject malicious JavaScript code. The attack vector is remote and does not require authentication, but successful exploitation depends on user interaction, such as clicking a maliciously crafted URL. The vulnerability can be exploited to execute arbitrary scripts in the context of the victim's browser session, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions within the application. The CVSS 4.0 base score is 5.1, reflecting medium severity due to the lack of required privileges but presence of user interaction. Although no active exploits have been reported in the wild, a proof-of-concept exploit has been publicly disclosed, increasing the risk of exploitation. The vulnerability affects all versions up to 2.10, indicating that organizations running older versions are at risk. The lack of vendor patches at the time of publication necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk of unauthorized access to user sessions and sensitive educational data. Exploitation could lead to compromised user credentials, unauthorized data manipulation, and potential disruption of educational services. The impact extends to data confidentiality and integrity, as attackers may steal personal information or alter records. Given the remote exploitability without authentication, attackers can target users via phishing or malicious links, increasing the attack surface. The medium severity suggests moderate risk, but the presence of a public exploit heightens urgency. Disruption in educational environments could affect operational continuity and trust. Additionally, compliance with GDPR mandates protection of personal data, and exploitation could lead to regulatory penalties. Therefore, European organizations must assess their exposure and implement mitigations promptly to avoid reputational and legal consequences.

Mitigation Recommendations

Organizations should immediately inventory their deployments of Portabilis i-Educar to identify affected versions up to 2.10. Although no official patches are currently listed, monitoring vendor communications for updates is critical. In the interim, implement strict input validation and output encoding on the nm_tipo/descricao parameter to neutralize malicious scripts. Deploy Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Educate users about phishing risks and the dangers of clicking unknown links. Employ web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable parameter. Regularly audit logs for suspicious activity related to the intranet module. Consider isolating the affected module or restricting access to trusted users until a patch is available. Finally, establish incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T14:26:45.735Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c5b4bee14ebf9f5cc7eca6

Added to database: 9/13/2025, 6:15:26 PM

Last enriched: 10/28/2025, 3:50:18 AM

Last updated: 10/29/2025, 9:29:24 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats