Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9652: Cross Site Scripting in Portabilis i-Educar

0
Medium
VulnerabilityCVE-2025-9652cvecve-2025-9652
Published: Fri Aug 29 2025 (08/29/2025, 14:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability was determined in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file /intranet/educar_transferencia_tipo_cad.php of the component Cadastrar tipo de transferência Page. This manipulation of the argument nm_tipo/desc_tipo causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 09/05/2025, 20:37:29 UTC

Technical Analysis

CVE-2025-9652 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar platform, specifically affecting versions 2.0 through 2.10. The vulnerability resides in the /intranet/educar_transferencia_tipo_cad.php file within the component responsible for managing the 'Cadastrar tipo de transferência' (Register transfer type) page. The flaw arises from improper sanitization or validation of user-supplied input parameters, specifically the 'nm_tipo' and 'desc_tipo' arguments. An attacker can remotely manipulate these parameters to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability can be exploited without authentication (though the CVSS vector indicates low privileges required) and requires user interaction, such as clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score of 5.1 reflects a medium severity, indicating moderate impact primarily on confidentiality and integrity, with limited availability impact. The vulnerability does not require user credentials but does require user interaction, and there is no indication of scope change or privilege escalation. Although no known exploits are currently reported in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation by attackers. XSS vulnerabilities like this can be leveraged for session hijacking, defacement, phishing, or delivering further malware payloads, especially in web applications used in educational environments like i-Educar. Given that i-Educar is an education management system widely used in Brazil and some other regions, the vulnerability could impact the confidentiality of student and staff data and the integrity of educational records if exploited.

Potential Impact

For European organizations, the impact of this vulnerability depends on the adoption of Portabilis i-Educar within their educational institutions. While i-Educar is primarily popular in Brazil, any European entities using this platform or similar versions could face risks including unauthorized access to session tokens, user impersonation, and potential data theft or manipulation. The exploitation of this XSS vulnerability could lead to compromised user accounts, leakage of sensitive educational data, and erosion of trust in the affected institutions. Additionally, attackers could use the vulnerability as a foothold to conduct further attacks within the network. The medium severity score suggests that while the vulnerability is not critical, it still poses a significant risk, especially in environments where sensitive personal data is handled. European data protection regulations such as GDPR impose strict requirements on data security; thus, exploitation could lead to regulatory penalties and reputational damage. The requirement for user interaction means social engineering or phishing campaigns could be used to trigger the exploit, increasing the attack surface.

Mitigation Recommendations

To mitigate this vulnerability, organizations should prioritize the following actions: 1) Apply patches or updates from Portabilis as soon as they become available to address the input validation flaws in the affected PHP file. 2) Implement robust input validation and output encoding on all user-supplied data, especially for parameters like 'nm_tipo' and 'desc_tipo', to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4) Conduct security awareness training for users to recognize and avoid phishing attempts that could trigger the XSS exploit. 5) Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting the i-Educar application. 6) Regularly audit and monitor web application logs for suspicious activities indicative of attempted XSS exploitation. 7) If patching is delayed, consider temporarily disabling or restricting access to the vulnerable component or page to reduce exposure. These measures, combined, will reduce the likelihood and impact of exploitation beyond generic advice.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T06:54:09.092Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b1bd93ad5a09ad0078bc81

Added to database: 8/29/2025, 2:47:47 PM

Last enriched: 9/5/2025, 8:37:29 PM

Last updated: 10/14/2025, 12:28:14 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats