Skip to main content

CVE-2025-7111: Cross Site Scripting in Portabilis i-Educar

Medium
VulnerabilityCVE-2025-7111cvecve-2025-7111
Published: Mon Jul 07 2025 (07/07/2025, 04:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:11:17 UTC

Technical Analysis

CVE-2025-7111 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Educar version 2.9.0, specifically within the Course Module component accessed via the /intranet/educar_curso_det.php endpoint. The vulnerability arises from improper sanitization or validation of the 'cod_curso' parameter, which allows an attacker to inject malicious scripts remotely. The vulnerability is classified as problematic and has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges, but the vector states no privileges needed), and user interaction is required (UI:P). The impact primarily affects the integrity of the user interface and potentially the confidentiality of session data, as the injected scripts could execute in the context of the victim's browser. The vendor was notified but did not respond, and no patches have been released at the time of disclosure. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could be leveraged to perform session hijacking, defacement, or phishing attacks targeting users of the i-Educar platform.

Potential Impact

For European organizations using Portabilis i-Educar 2.9.0, particularly educational institutions, this vulnerability poses a risk to the confidentiality and integrity of user data and the trustworthiness of the platform. Successful exploitation could lead to unauthorized script execution in users' browsers, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver malicious payloads. This could disrupt educational activities, compromise sensitive student or staff information, and damage institutional reputation. Given the remote exploitability and the public availability of exploit details, the threat is heightened. The impact is especially significant for organizations relying on i-Educar for managing courses and student information, as attackers could target administrators or educators with privileged access. Additionally, the lack of vendor response and patches increases the window of exposure for European entities.

Mitigation Recommendations

Organizations should immediately audit their use of Portabilis i-Educar 2.9.0 and assess exposure to the vulnerable endpoint. Practical mitigation steps include: 1) Implementing web application firewall (WAF) rules to detect and block malicious payloads targeting the 'cod_curso' parameter, focusing on common XSS attack patterns. 2) Applying input validation and output encoding at the application level if source code access is available, sanitizing all user-supplied inputs before rendering. 3) Restricting access to the intranet module via network segmentation or VPN to limit exposure to trusted users only. 4) Monitoring logs for unusual requests or error patterns related to the vulnerable endpoint. 5) Educating users about phishing and suspicious links to reduce the impact of potential XSS-based social engineering. 6) Engaging with the vendor or community to track patch releases and apply updates promptly once available. 7) Considering temporary migration to alternative platforms if remediation is not feasible in the short term.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-06T05:41:21.255Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686b4bf56f40f0eb72db2490

Added to database: 7/7/2025, 4:24:21 AM

Last enriched: 7/14/2025, 9:11:17 PM

Last updated: 8/18/2025, 8:05:25 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats