CVE-2025-7111: Cross Site Scripting in Portabilis i-Educar
A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7111 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Educar version 2.9.0, specifically within the Course Module component accessed via the /intranet/educar_curso_det.php endpoint. The vulnerability arises from improper sanitization or validation of the 'cod_curso' parameter, which allows an attacker to inject malicious scripts remotely. The vulnerability is classified as problematic and has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges, but the vector states no privileges needed), and user interaction is required (UI:P). The impact primarily affects the integrity of the user interface and potentially the confidentiality of session data, as the injected scripts could execute in the context of the victim's browser. The vendor was notified but did not respond, and no patches have been released at the time of disclosure. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could be leveraged to perform session hijacking, defacement, or phishing attacks targeting users of the i-Educar platform.
Potential Impact
For European organizations using Portabilis i-Educar 2.9.0, particularly educational institutions, this vulnerability poses a risk to the confidentiality and integrity of user data and the trustworthiness of the platform. Successful exploitation could lead to unauthorized script execution in users' browsers, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver malicious payloads. This could disrupt educational activities, compromise sensitive student or staff information, and damage institutional reputation. Given the remote exploitability and the public availability of exploit details, the threat is heightened. The impact is especially significant for organizations relying on i-Educar for managing courses and student information, as attackers could target administrators or educators with privileged access. Additionally, the lack of vendor response and patches increases the window of exposure for European entities.
Mitigation Recommendations
Organizations should immediately audit their use of Portabilis i-Educar 2.9.0 and assess exposure to the vulnerable endpoint. Practical mitigation steps include: 1) Implementing web application firewall (WAF) rules to detect and block malicious payloads targeting the 'cod_curso' parameter, focusing on common XSS attack patterns. 2) Applying input validation and output encoding at the application level if source code access is available, sanitizing all user-supplied inputs before rendering. 3) Restricting access to the intranet module via network segmentation or VPN to limit exposure to trusted users only. 4) Monitoring logs for unusual requests or error patterns related to the vulnerable endpoint. 5) Educating users about phishing and suspicious links to reduce the impact of potential XSS-based social engineering. 6) Engaging with the vendor or community to track patch releases and apply updates promptly once available. 7) Considering temporary migration to alternative platforms if remediation is not feasible in the short term.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom
CVE-2025-7111: Cross Site Scripting in Portabilis i-Educar
Description
A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7111 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Educar version 2.9.0, specifically within the Course Module component accessed via the /intranet/educar_curso_det.php endpoint. The vulnerability arises from improper sanitization or validation of the 'cod_curso' parameter, which allows an attacker to inject malicious scripts remotely. The vulnerability is classified as problematic and has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges, but the vector states no privileges needed), and user interaction is required (UI:P). The impact primarily affects the integrity of the user interface and potentially the confidentiality of session data, as the injected scripts could execute in the context of the victim's browser. The vendor was notified but did not respond, and no patches have been released at the time of disclosure. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could be leveraged to perform session hijacking, defacement, or phishing attacks targeting users of the i-Educar platform.
Potential Impact
For European organizations using Portabilis i-Educar 2.9.0, particularly educational institutions, this vulnerability poses a risk to the confidentiality and integrity of user data and the trustworthiness of the platform. Successful exploitation could lead to unauthorized script execution in users' browsers, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver malicious payloads. This could disrupt educational activities, compromise sensitive student or staff information, and damage institutional reputation. Given the remote exploitability and the public availability of exploit details, the threat is heightened. The impact is especially significant for organizations relying on i-Educar for managing courses and student information, as attackers could target administrators or educators with privileged access. Additionally, the lack of vendor response and patches increases the window of exposure for European entities.
Mitigation Recommendations
Organizations should immediately audit their use of Portabilis i-Educar 2.9.0 and assess exposure to the vulnerable endpoint. Practical mitigation steps include: 1) Implementing web application firewall (WAF) rules to detect and block malicious payloads targeting the 'cod_curso' parameter, focusing on common XSS attack patterns. 2) Applying input validation and output encoding at the application level if source code access is available, sanitizing all user-supplied inputs before rendering. 3) Restricting access to the intranet module via network segmentation or VPN to limit exposure to trusted users only. 4) Monitoring logs for unusual requests or error patterns related to the vulnerable endpoint. 5) Educating users about phishing and suspicious links to reduce the impact of potential XSS-based social engineering. 6) Engaging with the vendor or community to track patch releases and apply updates promptly once available. 7) Considering temporary migration to alternative platforms if remediation is not feasible in the short term.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-06T05:41:21.255Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686b4bf56f40f0eb72db2490
Added to database: 7/7/2025, 4:24:21 AM
Last enriched: 7/14/2025, 9:11:17 PM
Last updated: 1/7/2026, 4:18:37 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.