Skip to main content

CVE-2025-9652: Cross Site Scripting in Portabilis i-Educar

Medium
VulnerabilityCVE-2025-9652cvecve-2025-9652
Published: Fri Aug 29 2025 (08/29/2025, 14:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability was determined in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file /intranet/educar_transferencia_tipo_cad.php of the component Cadastrar tipo de transferência Page. This manipulation of the argument nm_tipo/desc_tipo causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 08/29/2025, 15:02:54 UTC

Technical Analysis

CVE-2025-9652 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar software, specifically affecting versions 2.0 through 2.10. The vulnerability exists in the /intranet/educar_transferencia_tipo_cad.php file within the component responsible for the 'Cadastrar tipo de transferência' page. The flaw arises from improper sanitization or validation of user-supplied input parameters, namely 'nm_tipo' and 'desc_tipo'. An attacker can manipulate these parameters to inject malicious scripts, which are then executed in the context of the victim's browser when they access the affected page. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., by visiting a crafted URL). The CVSS 4.0 base score is 5.1, indicating a medium severity level, with the vector highlighting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality and integrity to a limited extent by enabling script execution that could steal session tokens, perform actions on behalf of the user, or deface the web interface. No known exploits are currently observed in the wild, but the exploit details have been publicly disclosed, increasing the risk of exploitation. The lack of available patches at the time of publication suggests that affected organizations need to implement mitigations promptly to reduce exposure.

Potential Impact

For European organizations using Portabilis i-Educar, particularly educational institutions and administrative bodies, this XSS vulnerability poses a risk of session hijacking, credential theft, and unauthorized actions performed through the victim's browser. Given that i-Educar is an education management system, exploitation could lead to unauthorized access to sensitive student and staff information, manipulation of academic records, or disruption of administrative processes. The impact on confidentiality and integrity could result in data breaches and loss of trust. Additionally, successful exploitation could be leveraged as a foothold for further attacks within the network. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users into triggering the exploit. The medium severity indicates that while the vulnerability is not critical, it still represents a significant threat that should be addressed promptly to avoid potential reputational and regulatory consequences under GDPR and other data protection laws applicable in Europe.

Mitigation Recommendations

Specific mitigation steps include: 1) Immediate review and restriction of user input on the affected parameters ('nm_tipo' and 'desc_tipo') by implementing strict server-side input validation and sanitization to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Enable HTTP-only and secure flags on session cookies to reduce the risk of session hijacking via XSS. 4) Monitor web server logs for suspicious requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5) Educate users about phishing risks and encourage caution when clicking on links, especially those received via email or messaging platforms. 6) Engage with the vendor Portabilis for patches or updates and apply them as soon as they become available. 7) Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the specific vulnerable parameters. These measures, combined, will reduce the attack surface and mitigate the risk until an official patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T06:54:09.092Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b1bd93ad5a09ad0078bc81

Added to database: 8/29/2025, 2:47:47 PM

Last enriched: 8/29/2025, 3:02:54 PM

Last updated: 8/29/2025, 5:46:28 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats