CVE-2025-10584: Cross Site Scripting in Portabilis i-Educar
A vulnerability was identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_calendario_anotacao_cad.php. Such manipulation of the argument nm_anotacao/descricao leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-10584 is a cross-site scripting vulnerability identified in the Portabilis i-Educar platform, specifically affecting versions 2.0 through 2.10. The vulnerability resides in the /intranet/educar_calendario_anotacao_cad.php file, where the parameters nm_anotacao and descricao are not properly sanitized or encoded before being reflected in the web page output. This improper handling allows an attacker to inject malicious JavaScript code remotely without requiring authentication. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), but user interaction is necessary (UI:P). The vulnerability impacts the integrity and confidentiality of the victim’s session by enabling script execution in their browser context, potentially leading to session hijacking, credential theft, or phishing. Although no active exploitation has been reported, a public exploit exists, increasing the likelihood of exploitation. The vulnerability does not affect availability and does not propagate beyond the vulnerable system. The CVSS 4.0 base score is 5.1, reflecting a medium severity level. The vulnerability is particularly concerning for educational institutions using i-Educar, as it could compromise sensitive student and staff information or disrupt educational operations. The lack of official patches at the time of publication necessitates immediate mitigation efforts by administrators.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk to the confidentiality and integrity of user data. Successful exploitation could allow attackers to execute malicious scripts in the browsers of educators, students, or administrators, potentially leading to session hijacking, theft of credentials, or unauthorized actions within the platform. This could result in unauthorized access to sensitive educational records, manipulation of academic data, or phishing campaigns targeting users. While availability is not directly impacted, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. The medium severity score indicates moderate risk, but the presence of a public exploit and the remote attack vector increase the urgency of addressing this vulnerability. European organizations relying on i-Educar for educational management should consider the threat serious enough to warrant immediate action to prevent exploitation.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the nm_anotacao and descricao parameters to prevent injection of malicious scripts. 2. Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 3. Restrict access to the vulnerable /intranet/educar_calendario_anotacao_cad.php endpoint to trusted users or networks where possible. 4. Monitor web application logs for suspicious input patterns indicative of XSS attempts. 5. Educate users about the risks of clicking on unsolicited links and encourage the use of updated browsers with built-in XSS protections. 6. Engage with Portabilis for official patches or updates and apply them promptly once available. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this vulnerability. 8. Conduct regular security assessments and code reviews of the i-Educar deployment to identify and remediate similar vulnerabilities proactively.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom, Netherlands, Belgium
CVE-2025-10584: Cross Site Scripting in Portabilis i-Educar
Description
A vulnerability was identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_calendario_anotacao_cad.php. Such manipulation of the argument nm_anotacao/descricao leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10584 is a cross-site scripting vulnerability identified in the Portabilis i-Educar platform, specifically affecting versions 2.0 through 2.10. The vulnerability resides in the /intranet/educar_calendario_anotacao_cad.php file, where the parameters nm_anotacao and descricao are not properly sanitized or encoded before being reflected in the web page output. This improper handling allows an attacker to inject malicious JavaScript code remotely without requiring authentication. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), but user interaction is necessary (UI:P). The vulnerability impacts the integrity and confidentiality of the victim’s session by enabling script execution in their browser context, potentially leading to session hijacking, credential theft, or phishing. Although no active exploitation has been reported, a public exploit exists, increasing the likelihood of exploitation. The vulnerability does not affect availability and does not propagate beyond the vulnerable system. The CVSS 4.0 base score is 5.1, reflecting a medium severity level. The vulnerability is particularly concerning for educational institutions using i-Educar, as it could compromise sensitive student and staff information or disrupt educational operations. The lack of official patches at the time of publication necessitates immediate mitigation efforts by administrators.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk to the confidentiality and integrity of user data. Successful exploitation could allow attackers to execute malicious scripts in the browsers of educators, students, or administrators, potentially leading to session hijacking, theft of credentials, or unauthorized actions within the platform. This could result in unauthorized access to sensitive educational records, manipulation of academic data, or phishing campaigns targeting users. While availability is not directly impacted, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. The medium severity score indicates moderate risk, but the presence of a public exploit and the remote attack vector increase the urgency of addressing this vulnerability. European organizations relying on i-Educar for educational management should consider the threat serious enough to warrant immediate action to prevent exploitation.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the nm_anotacao and descricao parameters to prevent injection of malicious scripts. 2. Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 3. Restrict access to the vulnerable /intranet/educar_calendario_anotacao_cad.php endpoint to trusted users or networks where possible. 4. Monitor web application logs for suspicious input patterns indicative of XSS attempts. 5. Educate users about the risks of clicking on unsolicited links and encourage the use of updated browsers with built-in XSS protections. 6. Engage with Portabilis for official patches or updates and apply them promptly once available. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this vulnerability. 8. Conduct regular security assessments and code reviews of the i-Educar deployment to identify and remediate similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-16T20:17:14.422Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ca2bd1571b2840ff02c434
Added to database: 9/17/2025, 3:32:33 AM
Last enriched: 10/20/2025, 5:10:10 AM
Last updated: 11/2/2025, 10:08:51 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12604: SQL Injection in itsourcecode Online Loan Management System
MediumScans for Port 8530/8531 (TCP). Likely related to WSUS Vulnerability CVE-2025-59287, (Sun, Nov 2nd)
MediumCVE-2025-12598: SQL Injection in SourceCodester Best House Rental Management System
MediumCVE-2025-12597: SQL Injection in SourceCodester Best House Rental Management System
MediumCVE-2025-12596: Buffer Overflow in Tenda AC23
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.