CVE-2025-10373: Cross Site Scripting in Portabilis i-Educar
A security vulnerability has been detected in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /intranet/educar_turma_tipo_cad.php. Such manipulation of the argument nm_tipo leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10373 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar platform, affecting all versions up to 2.10. The vulnerability resides in an unspecified function within the file /intranet/educar_turma_tipo_cad.php, specifically involving the manipulation of the 'nm_tipo' argument. An attacker can exploit this flaw by injecting malicious scripts remotely, without requiring authentication, although user interaction is necessary to trigger the payload. The vulnerability is classified as reflected or stored XSS, allowing attackers to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and limited impact on integrity and availability. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation. The vulnerability affects educational institutions and organizations using i-Educar for intranet-based management of school classes and types, potentially exposing sensitive educational data and user credentials.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a moderate risk. Successful exploitation could lead to unauthorized access to user sessions, data leakage, and potential manipulation of educational records or administrative functions. Given that i-Educar is an education management system, compromised accounts could disrupt school operations, expose personal data of students and staff, and damage institutional reputation. The remote exploitability without authentication increases the attack surface, especially in environments where the intranet is accessible or insufficiently segmented. The requirement for user interaction means phishing or social engineering could be leveraged to trigger the attack. The impact on confidentiality and integrity is moderate, while availability impact is minimal. European data protection regulations such as GDPR impose strict requirements on protecting personal data, so exploitation could also lead to regulatory penalties and compliance issues.
Mitigation Recommendations
Organizations should immediately assess their use of Portabilis i-Educar versions up to 2.10 and plan for an upgrade or patch as soon as one becomes available from the vendor. In the absence of an official patch, implement input validation and output encoding on the 'nm_tipo' parameter to neutralize malicious scripts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this parameter. Educate users about the risks of clicking on untrusted links or interacting with unexpected content within the intranet. Network segmentation should be enforced to restrict access to the intranet hosting i-Educar, limiting exposure to external threats. Regularly monitor logs for unusual activity related to the vulnerable endpoint. Finally, conduct security testing and code reviews on customizations or integrations involving i-Educar to identify and remediate similar injection flaws.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom
CVE-2025-10373: Cross Site Scripting in Portabilis i-Educar
Description
A security vulnerability has been detected in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /intranet/educar_turma_tipo_cad.php. Such manipulation of the argument nm_tipo leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10373 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar platform, affecting all versions up to 2.10. The vulnerability resides in an unspecified function within the file /intranet/educar_turma_tipo_cad.php, specifically involving the manipulation of the 'nm_tipo' argument. An attacker can exploit this flaw by injecting malicious scripts remotely, without requiring authentication, although user interaction is necessary to trigger the payload. The vulnerability is classified as reflected or stored XSS, allowing attackers to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and limited impact on integrity and availability. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation. The vulnerability affects educational institutions and organizations using i-Educar for intranet-based management of school classes and types, potentially exposing sensitive educational data and user credentials.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a moderate risk. Successful exploitation could lead to unauthorized access to user sessions, data leakage, and potential manipulation of educational records or administrative functions. Given that i-Educar is an education management system, compromised accounts could disrupt school operations, expose personal data of students and staff, and damage institutional reputation. The remote exploitability without authentication increases the attack surface, especially in environments where the intranet is accessible or insufficiently segmented. The requirement for user interaction means phishing or social engineering could be leveraged to trigger the attack. The impact on confidentiality and integrity is moderate, while availability impact is minimal. European data protection regulations such as GDPR impose strict requirements on protecting personal data, so exploitation could also lead to regulatory penalties and compliance issues.
Mitigation Recommendations
Organizations should immediately assess their use of Portabilis i-Educar versions up to 2.10 and plan for an upgrade or patch as soon as one becomes available from the vendor. In the absence of an official patch, implement input validation and output encoding on the 'nm_tipo' parameter to neutralize malicious scripts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this parameter. Educate users about the risks of clicking on untrusted links or interacting with unexpected content within the intranet. Network segmentation should be enforced to restrict access to the intranet hosting i-Educar, limiting exposure to external threats. Regularly monitor logs for unusual activity related to the vulnerable endpoint. Finally, conduct security testing and code reviews on customizations or integrations involving i-Educar to identify and remediate similar injection flaws.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T14:26:55.893Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c5bbbae14ebf9f5cc83e7b
Added to database: 9/13/2025, 6:45:14 PM
Last enriched: 9/13/2025, 7:00:19 PM
Last updated: 9/13/2025, 9:35:00 PM
Views: 5
Related Threats
CVE-2025-10384: Improper Authorization in yangzongzhuan RuoYi
MediumCVE-2025-10374: Improper Authorization in Shenzhen Sixun Business Management System
MediumCVE-2025-10372: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-10371: Unrestricted Upload in eCharge Hardy Barth Salia PLCC
MediumCVE-2025-10370: Cross Site Scripting in MiczFlor RPi-Jukebox-RFID
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.