CVE-2025-7111: Cross Site Scripting in Portabilis i-Educar
A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7111 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Educar version 2.9.0, specifically within the Course Module component accessed via the /intranet/educar_curso_det.php endpoint. The vulnerability arises from improper sanitization or validation of the 'cod_curso' parameter, which allows an attacker to inject malicious scripts remotely. The vulnerability is classified as problematic and has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges, but the vector states no privileges needed), and user interaction is required (UI:P). The impact primarily affects the integrity of the user interface and potentially the confidentiality of session data, as the injected scripts could execute in the context of the victim's browser. The vendor was notified but did not respond, and no patches have been released at the time of disclosure. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could be leveraged to perform session hijacking, defacement, or phishing attacks targeting users of the i-Educar platform.
Potential Impact
For European organizations using Portabilis i-Educar 2.9.0, particularly educational institutions, this vulnerability poses a risk to the confidentiality and integrity of user data and the trustworthiness of the platform. Successful exploitation could lead to unauthorized script execution in users' browsers, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver malicious payloads. This could disrupt educational activities, compromise sensitive student or staff information, and damage institutional reputation. Given the remote exploitability and the public availability of exploit details, the threat is heightened. The impact is especially significant for organizations relying on i-Educar for managing courses and student information, as attackers could target administrators or educators with privileged access. Additionally, the lack of vendor response and patches increases the window of exposure for European entities.
Mitigation Recommendations
Organizations should immediately audit their use of Portabilis i-Educar 2.9.0 and assess exposure to the vulnerable endpoint. Practical mitigation steps include: 1) Implementing web application firewall (WAF) rules to detect and block malicious payloads targeting the 'cod_curso' parameter, focusing on common XSS attack patterns. 2) Applying input validation and output encoding at the application level if source code access is available, sanitizing all user-supplied inputs before rendering. 3) Restricting access to the intranet module via network segmentation or VPN to limit exposure to trusted users only. 4) Monitoring logs for unusual requests or error patterns related to the vulnerable endpoint. 5) Educating users about phishing and suspicious links to reduce the impact of potential XSS-based social engineering. 6) Engaging with the vendor or community to track patch releases and apply updates promptly once available. 7) Considering temporary migration to alternative platforms if remediation is not feasible in the short term.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom
CVE-2025-7111: Cross Site Scripting in Portabilis i-Educar
Description
A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7111 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Educar version 2.9.0, specifically within the Course Module component accessed via the /intranet/educar_curso_det.php endpoint. The vulnerability arises from improper sanitization or validation of the 'cod_curso' parameter, which allows an attacker to inject malicious scripts remotely. The vulnerability is classified as problematic and has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges, but the vector states no privileges needed), and user interaction is required (UI:P). The impact primarily affects the integrity of the user interface and potentially the confidentiality of session data, as the injected scripts could execute in the context of the victim's browser. The vendor was notified but did not respond, and no patches have been released at the time of disclosure. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could be leveraged to perform session hijacking, defacement, or phishing attacks targeting users of the i-Educar platform.
Potential Impact
For European organizations using Portabilis i-Educar 2.9.0, particularly educational institutions, this vulnerability poses a risk to the confidentiality and integrity of user data and the trustworthiness of the platform. Successful exploitation could lead to unauthorized script execution in users' browsers, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver malicious payloads. This could disrupt educational activities, compromise sensitive student or staff information, and damage institutional reputation. Given the remote exploitability and the public availability of exploit details, the threat is heightened. The impact is especially significant for organizations relying on i-Educar for managing courses and student information, as attackers could target administrators or educators with privileged access. Additionally, the lack of vendor response and patches increases the window of exposure for European entities.
Mitigation Recommendations
Organizations should immediately audit their use of Portabilis i-Educar 2.9.0 and assess exposure to the vulnerable endpoint. Practical mitigation steps include: 1) Implementing web application firewall (WAF) rules to detect and block malicious payloads targeting the 'cod_curso' parameter, focusing on common XSS attack patterns. 2) Applying input validation and output encoding at the application level if source code access is available, sanitizing all user-supplied inputs before rendering. 3) Restricting access to the intranet module via network segmentation or VPN to limit exposure to trusted users only. 4) Monitoring logs for unusual requests or error patterns related to the vulnerable endpoint. 5) Educating users about phishing and suspicious links to reduce the impact of potential XSS-based social engineering. 6) Engaging with the vendor or community to track patch releases and apply updates promptly once available. 7) Considering temporary migration to alternative platforms if remediation is not feasible in the short term.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-06T05:41:21.255Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686b4bf56f40f0eb72db2490
Added to database: 7/7/2025, 4:24:21 AM
Last enriched: 7/14/2025, 9:11:17 PM
Last updated: 8/18/2025, 8:05:25 PM
Views: 25
Related Threats
CVE-2025-8064: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in aicwebtech Bible SuperSearch
MediumCVE-2025-8895: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cozmoslabs WP Webhooks – Automate repetitive tasks by creating powerful automation workflows directly within WordPress
CriticalCVE-2025-7390: CWE-295 Improper Certificate Validation in Softing Industrial Automation GmbH OPC UA C++ SDK
CriticalCVE-2025-53505: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Intermesh BV Group-Office
MediumCVE-2025-53504: Cross-site scripting (XSS) in Intermesh BV Group-Office
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.