Skip to main content

CVE-2025-7110: Cross Site Scripting in Portabilis i-Educar

Medium
VulnerabilityCVE-2025-7110cvecve-2025-7110
Published: Mon Jul 07 2025 (07/07/2025, 03:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability, which was classified as problematic, was found in Portabilis i-Educar 2.9.0. This affects an unknown part of the file /intranet/educar_escola_lst.php of the component School Module. The manipulation of the argument Escola leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:11:01 UTC

Technical Analysis

CVE-2025-7110 is a cross-site scripting (XSS) vulnerability identified in version 2.9.0 of Portabilis i-Educar, an educational management software platform. The vulnerability resides in the School Module, specifically in the /intranet/educar_escola_lst.php file. It is triggered by manipulation of the 'Escola' parameter, which is not properly sanitized or encoded before being reflected in the web application response. This allows an attacker to inject malicious scripts that execute in the context of the victim's browser. The vulnerability is remotely exploitable without authentication, requiring only user interaction to trigger the malicious payload. The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector details show network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), user interaction required (UI:P), and no impact on confidentiality or availability but low impact on integrity (VI:L). The vendor was notified but did not respond or provide a patch, and the exploit details have been publicly disclosed, increasing the risk of exploitation. Although no known exploits are currently reported in the wild, the public disclosure and lack of vendor response heighten the urgency for mitigation. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks within the i-Educar intranet environment.

Potential Impact

For European organizations using Portabilis i-Educar, particularly educational institutions, this vulnerability poses a risk of session hijacking, unauthorized actions, and data manipulation within the school management system. The impact is primarily on the integrity and trustworthiness of the application, potentially leading to unauthorized changes in student records or administrative data. Confidentiality impact is limited but could be escalated if combined with other vulnerabilities. The requirement for user interaction means phishing or social engineering could be used to exploit the flaw. Disruption of educational services or reputational damage could result if attackers leverage this vulnerability to deface portals or inject misleading information. Given the sensitive nature of educational data and the increasing digitalization of school administration in Europe, exploitation could undermine data protection compliance (e.g., GDPR) and erode stakeholder trust.

Mitigation Recommendations

Organizations should immediately implement input validation and output encoding on the 'Escola' parameter within the affected module to neutralize malicious scripts. Since no official patch is available, applying web application firewall (WAF) rules to detect and block suspicious payloads targeting this parameter is critical. Restricting user privileges to the minimum necessary can reduce the impact of exploitation. Educating users about phishing risks and suspicious links can mitigate user interaction requirements. Network segmentation of the intranet hosting i-Educar can limit exposure. Monitoring logs for unusual activity related to the School Module and the 'Escola' parameter is recommended. If feasible, consider temporarily disabling or restricting access to the vulnerable module until a vendor patch or official fix is released. Organizations should also engage with Portabilis for updates and consider alternative solutions if the vendor remains unresponsive.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-06T05:41:18.323Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686b44ed6f40f0eb72db13f0

Added to database: 7/7/2025, 3:54:21 AM

Last enriched: 7/14/2025, 9:11:01 PM

Last updated: 8/21/2025, 5:11:32 AM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats