Skip to main content

CVE-2025-8785: Cross Site Scripting in Portabilis i-Educar

Medium
VulnerabilityCVE-2025-8785cvecve-2025-8785
Published: Sat Aug 09 2025 (08/09/2025, 23:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar up to 2.9. This issue affects some unknown processing of the file /intranet/educar_usuario_lst.php. The manipulation of the argument nm_pessoa/matricula/matricula_interna leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/10/2025, 00:02:44 UTC

Technical Analysis

CVE-2025-8785 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar platform, versions up to 2.9. The vulnerability arises from improper handling of user-supplied input parameters, specifically nm_pessoa, matricula, and matricula_interna, within the /intranet/educar_usuario_lst.php file. An attacker can manipulate these parameters to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability allows attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability is remotely exploitable without authentication, but requires some user interaction (e.g., clicking a crafted link). The CVSS 4.0 base score is 5.1, indicating a medium severity level, reflecting the moderate impact on confidentiality and integrity with limited availability impact. The vendor has been notified but has not responded or issued a patch, and no known exploits are currently reported in the wild. The vulnerability affects all versions from 2.0 through 2.9 of i-Educar, a widely used open-source educational management system primarily deployed in educational institutions to manage student data and administrative tasks.

Potential Impact

For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk to the confidentiality and integrity of user data. Successful exploitation could allow attackers to steal session cookies, impersonate users (including administrators), and potentially escalate privileges or manipulate sensitive educational records. This could lead to unauthorized access to personal student information, disruption of educational services, and reputational damage. Given the nature of the platform, the impact extends to privacy compliance risks under GDPR, as personal data could be exposed or manipulated. Although the vulnerability does not directly affect system availability, the indirect effects of data breaches or defacement could disrupt normal operations. The lack of vendor response and patch availability increases the risk exposure for organizations that have not implemented compensating controls.

Mitigation Recommendations

Organizations should immediately implement input validation and output encoding on all user-supplied data fields, especially nm_pessoa, matricula, and matricula_interna, to neutralize malicious scripts. Web application firewalls (WAFs) should be configured to detect and block XSS attack patterns targeting these parameters. Administrators should monitor logs for unusual requests to /intranet/educar_usuario_lst.php and suspicious parameter values. User awareness training should emphasize caution when clicking on unexpected links related to the platform. If possible, organizations should consider isolating the i-Educar intranet environment or restricting access to trusted IP ranges to reduce exposure. Until an official patch is released, applying custom patches or community-developed fixes that sanitize inputs is recommended. Regular backups of critical data should be maintained to enable recovery in case of compromise. Finally, organizations should engage with the vendor or community to encourage timely patch development and share threat intelligence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T05:11:17.292Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6897de23ad5a09ad000f1481

Added to database: 8/9/2025, 11:47:47 PM

Last enriched: 8/10/2025, 12:02:44 AM

Last updated: 8/10/2025, 8:24:28 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats