Skip to main content

CVE-2025-10372: Cross Site Scripting in Portabilis i-Educar

Medium
VulnerabilityCVE-2025-10372cvecve-2025-10372
Published: Sat Sep 13 2025 (09/13/2025, 18:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A weakness has been identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_modulo_cad.php. This manipulation of the argument nm_tipo/descricao causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 09/13/2025, 18:30:14 UTC

Technical Analysis

CVE-2025-10372 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar platform, versions up to 2.10. The vulnerability exists in an unspecified function within the file /intranet/educar_modulo_cad.php, where improper sanitization or validation of the parameters 'nm_tipo' or 'descricao' allows an attacker to inject malicious scripts. This flaw enables remote attackers to execute arbitrary JavaScript code in the context of the victim's browser without requiring authentication, although user interaction is necessary to trigger the payload. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but it does require user interaction. The impact primarily affects the confidentiality and integrity of the user's session and data, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability does not affect system availability and does not require elevated privileges to exploit. Although no public exploit is currently known to be actively used in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability affects a broad range of i-Educar versions from 2.0 through 2.10, indicating that many deployments may be vulnerable if not updated or mitigated. i-Educar is an educational management system, so the vulnerability could impact educational institutions using this software for intranet and administrative purposes.

Potential Impact

For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk to the confidentiality and integrity of user data and sessions. Exploitation could lead to unauthorized access to sensitive student or staff information, manipulation of educational records, or unauthorized actions performed within the platform. Given the remote exploitability and public availability of exploit code, attackers could target users via phishing or malicious links to execute scripts in their browsers. This could result in data leakage, credential compromise, or reputational damage to affected institutions. While the vulnerability does not directly impact system availability, the indirect consequences of data breaches or unauthorized access could disrupt educational operations and erode trust in digital services. The medium severity suggests a moderate risk, but the widespread use of the affected versions could amplify the impact if not addressed promptly.

Mitigation Recommendations

1. Immediate application of patches or updates from Portabilis once available is the most effective mitigation. If patches are not yet released, organizations should implement input validation and output encoding on the affected parameters ('nm_tipo' and 'descricao') to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the i-Educar platform. 3. Educate users about the risks of clicking on suspicious links or inputs that could trigger XSS attacks, emphasizing cautious behavior with links received via email or messaging. 4. Implement web application firewalls (WAF) with rules designed to detect and block common XSS payloads targeting the vulnerable parameters. 5. Regularly audit and monitor web application logs for unusual activities or repeated attempts to inject scripts. 6. Limit user privileges within the platform to reduce the potential impact of compromised accounts. 7. Consider isolating the i-Educar intranet environment or restricting access to trusted networks until the vulnerability is remediated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T14:26:45.735Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c5b4bee14ebf9f5cc7eca6

Added to database: 9/13/2025, 6:15:26 PM

Last enriched: 9/13/2025, 6:30:14 PM

Last updated: 9/13/2025, 11:03:38 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats