Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9653: Cross Site Scripting in Portabilis i-Educar

0
Medium
VulnerabilityCVE-2025-9653cvecve-2025-9653
Published: Fri Aug 29 2025 (08/29/2025, 14:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability was identified in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_projeto_cad.php of the component Cadastrar projeto Page. Such manipulation of the argument nome/observacao leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 09/05/2025, 20:37:45 UTC

Technical Analysis

CVE-2025-9653 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar software, specifically affecting versions 2.0 through 2.10. The vulnerability resides in the /intranet/educar_projeto_cad.php file within the 'Cadastrar projeto' page component. The flaw arises due to improper sanitization or validation of user-supplied input in the 'nome' and 'observacao' parameters, which can be manipulated to inject malicious scripts. This vulnerability can be exploited remotely without authentication, requiring only user interaction to trigger the malicious payload. The CVSS 4.0 base score is 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P). The vulnerability impacts the confidentiality and integrity of the affected system to a limited extent, as it allows an attacker to execute arbitrary scripts in the context of the victim's browser session. Exploitation could lead to session hijacking, defacement, or redirection to malicious sites. Although no known exploits are currently reported in the wild, a public exploit exists, increasing the risk of exploitation. The vulnerability does not affect availability and does not require special conditions such as scope change or user authentication, making it relatively straightforward to exploit in environments where i-Educar is deployed.

Potential Impact

For European organizations using Portabilis i-Educar, particularly educational institutions and administrative bodies, this vulnerability poses a risk of unauthorized script execution within users' browsers. This can lead to theft of session tokens, unauthorized actions performed on behalf of users, or exposure of sensitive information. Given that i-Educar is an education management system, the confidentiality of student and staff data could be compromised. The integrity of data entries and user interactions may also be affected, potentially undermining trust in the system. Although the vulnerability does not directly impact system availability, successful exploitation could facilitate further attacks or phishing campaigns targeting users. The risk is heightened in environments where multiple users access the vulnerable component, increasing the attack surface. Additionally, the presence of a public exploit lowers the barrier for attackers, including opportunistic threat actors. European organizations must consider the regulatory implications, such as GDPR, where data breaches involving personal data could lead to significant penalties.

Mitigation Recommendations

To mitigate this vulnerability, organizations should prioritize updating Portabilis i-Educar to a patched version once available from the vendor. In the absence of an official patch, immediate steps include implementing strict input validation and output encoding on the 'nome' and 'observacao' parameters to neutralize malicious scripts. Web application firewalls (WAFs) can be configured to detect and block typical XSS payloads targeting the vulnerable endpoint. Additionally, applying Content Security Policy (CSP) headers can reduce the impact of successful XSS attacks by restricting script execution contexts. User awareness training should emphasize caution when interacting with links or inputs within the i-Educar system. Regular security assessments and penetration testing focusing on web application vulnerabilities are recommended to identify and remediate similar issues proactively. Logging and monitoring access to the vulnerable page can help detect exploitation attempts. Finally, restricting access to the intranet component to trusted networks or VPNs can reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T06:54:18.967Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b1bd93ad5a09ad0078bc87

Added to database: 8/29/2025, 2:47:47 PM

Last enriched: 9/5/2025, 8:37:45 PM

Last updated: 10/14/2025, 12:38:26 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats