CVE-2025-9652: Cross Site Scripting in Portabilis i-Educar
A vulnerability was determined in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file /intranet/educar_transferencia_tipo_cad.php of the component Cadastrar tipo de transferência Page. This manipulation of the argument nm_tipo/desc_tipo causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-9652 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar software, specifically affecting versions 2.0 through 2.10. The vulnerability exists in the /intranet/educar_transferencia_tipo_cad.php file within the component responsible for the 'Cadastrar tipo de transferência' page. The flaw arises from improper sanitization or validation of user-supplied input parameters, namely 'nm_tipo' and 'desc_tipo'. An attacker can manipulate these parameters to inject malicious scripts, which are then executed in the context of the victim's browser when they access the affected page. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., by visiting a crafted URL). The CVSS 4.0 base score is 5.1, indicating a medium severity level, with the vector highlighting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality and integrity to a limited extent by enabling script execution that could steal session tokens, perform actions on behalf of the user, or deface the web interface. No known exploits are currently observed in the wild, but the exploit details have been publicly disclosed, increasing the risk of exploitation. The lack of available patches at the time of publication suggests that affected organizations need to implement mitigations promptly to reduce exposure.
Potential Impact
For European organizations using Portabilis i-Educar, particularly educational institutions and administrative bodies, this XSS vulnerability poses a risk of session hijacking, credential theft, and unauthorized actions performed through the victim's browser. Given that i-Educar is an education management system, exploitation could lead to unauthorized access to sensitive student and staff information, manipulation of academic records, or disruption of administrative processes. The impact on confidentiality and integrity could result in data breaches and loss of trust. Additionally, successful exploitation could be leveraged as a foothold for further attacks within the network. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users into triggering the exploit. The medium severity indicates that while the vulnerability is not critical, it still represents a significant threat that should be addressed promptly to avoid potential reputational and regulatory consequences under GDPR and other data protection laws applicable in Europe.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate review and restriction of user input on the affected parameters ('nm_tipo' and 'desc_tipo') by implementing strict server-side input validation and sanitization to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Enable HTTP-only and secure flags on session cookies to reduce the risk of session hijacking via XSS. 4) Monitor web server logs for suspicious requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5) Educate users about phishing risks and encourage caution when clicking on links, especially those received via email or messaging platforms. 6) Engage with the vendor Portabilis for patches or updates and apply them as soon as they become available. 7) Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the specific vulnerable parameters. These measures, combined, will reduce the attack surface and mitigate the risk until an official patch is released.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom, Netherlands
CVE-2025-9652: Cross Site Scripting in Portabilis i-Educar
Description
A vulnerability was determined in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file /intranet/educar_transferencia_tipo_cad.php of the component Cadastrar tipo de transferência Page. This manipulation of the argument nm_tipo/desc_tipo causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-9652 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar software, specifically affecting versions 2.0 through 2.10. The vulnerability exists in the /intranet/educar_transferencia_tipo_cad.php file within the component responsible for the 'Cadastrar tipo de transferência' page. The flaw arises from improper sanitization or validation of user-supplied input parameters, namely 'nm_tipo' and 'desc_tipo'. An attacker can manipulate these parameters to inject malicious scripts, which are then executed in the context of the victim's browser when they access the affected page. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., by visiting a crafted URL). The CVSS 4.0 base score is 5.1, indicating a medium severity level, with the vector highlighting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality and integrity to a limited extent by enabling script execution that could steal session tokens, perform actions on behalf of the user, or deface the web interface. No known exploits are currently observed in the wild, but the exploit details have been publicly disclosed, increasing the risk of exploitation. The lack of available patches at the time of publication suggests that affected organizations need to implement mitigations promptly to reduce exposure.
Potential Impact
For European organizations using Portabilis i-Educar, particularly educational institutions and administrative bodies, this XSS vulnerability poses a risk of session hijacking, credential theft, and unauthorized actions performed through the victim's browser. Given that i-Educar is an education management system, exploitation could lead to unauthorized access to sensitive student and staff information, manipulation of academic records, or disruption of administrative processes. The impact on confidentiality and integrity could result in data breaches and loss of trust. Additionally, successful exploitation could be leveraged as a foothold for further attacks within the network. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users into triggering the exploit. The medium severity indicates that while the vulnerability is not critical, it still represents a significant threat that should be addressed promptly to avoid potential reputational and regulatory consequences under GDPR and other data protection laws applicable in Europe.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate review and restriction of user input on the affected parameters ('nm_tipo' and 'desc_tipo') by implementing strict server-side input validation and sanitization to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Enable HTTP-only and secure flags on session cookies to reduce the risk of session hijacking via XSS. 4) Monitor web server logs for suspicious requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5) Educate users about phishing risks and encourage caution when clicking on links, especially those received via email or messaging platforms. 6) Engage with the vendor Portabilis for patches or updates and apply them as soon as they become available. 7) Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the specific vulnerable parameters. These measures, combined, will reduce the attack surface and mitigate the risk until an official patch is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T06:54:09.092Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b1bd93ad5a09ad0078bc81
Added to database: 8/29/2025, 2:47:47 PM
Last enriched: 8/29/2025, 3:02:54 PM
Last updated: 8/29/2025, 5:46:28 PM
Views: 6
Related Threats
CVE-2025-9675: Improper Export of Android Application Components in Voice Changer App
MediumCVE-2025-9674: Improper Export of Android Application Components in Transbyte Scooper News App
MediumCVE-2025-9673: Improper Export of Android Application Components in Kakao 헤이카카오 Hey Kakao App
MediumCVE-2025-9672: Improper Export of Android Application Components in Rejseplanen App
MediumCVE-2025-9671: Improper Export of Android Application Components in UAB Paytend App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.