CVE-2025-9722: Cross Site Scripting in Portabilis i-Educar
A vulnerability has been found in Portabilis i-Educar up to 2.10. The impacted element is an unknown function of the file /intranet/educar_tipo_ocorrencia_disciplinar_cad.php. Such manipulation of the argument nm_tipo/descricao leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-9722 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar platform, affecting all versions up to 2.10. The vulnerability resides in the file /intranet/educar_tipo_ocorrencia_disciplinar_cad.php, specifically in the handling of the nm_tipo/descricao parameter. Improper sanitization or validation of this input allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., clicking a crafted link or visiting a malicious page). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but it requires user interaction. The impact primarily affects confidentiality and integrity by enabling theft of session cookies, credentials, or manipulation of displayed content, potentially leading to further attacks such as session hijacking or phishing. Availability impact is negligible. The vulnerability has been publicly disclosed, but no known exploits in the wild have been reported yet. The lack of an official patch link suggests that remediation may require vendor intervention or manual mitigation steps. Given the nature of the platform—an educational management system—this vulnerability could be leveraged to target educators, students, or administrative staff through social engineering or phishing campaigns, compromising sensitive educational data or user accounts.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk of unauthorized access to user sessions and sensitive data. Exploitation could lead to credential theft, unauthorized data modification, or distribution of malicious content within the educational environment. This could disrupt educational activities, damage institutional reputation, and violate data protection regulations such as GDPR if personal data is compromised. Since i-Educar is primarily used in educational contexts, the impact extends to students, teachers, and administrative personnel, potentially exposing minors to malicious content or privacy breaches. The medium severity score reflects a moderate risk, but the ease of remote exploitation and the lack of required privileges increase the urgency for mitigation. Additionally, the public disclosure of the vulnerability increases the likelihood of attempted exploitation, especially in environments with limited cybersecurity awareness or outdated software versions.
Mitigation Recommendations
1. Immediate mitigation should include input validation and output encoding on the affected parameters (nm_tipo/descricao) to neutralize malicious scripts. 2. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Educate users, especially staff and students, about the risks of clicking unknown links or opening suspicious content to reduce the chance of successful social engineering. 4. Monitor web server logs for suspicious requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5. If vendor patches become available, prioritize prompt application of updates to all affected systems. 6. Consider deploying Web Application Firewalls (WAF) with rules to detect and block XSS attack patterns targeting the i-Educar platform. 7. Conduct regular security assessments and code reviews of customizations or integrations with i-Educar to identify and remediate similar vulnerabilities. 8. Limit user privileges where possible to reduce the impact of compromised accounts.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom, Netherlands, Belgium
CVE-2025-9722: Cross Site Scripting in Portabilis i-Educar
Description
A vulnerability has been found in Portabilis i-Educar up to 2.10. The impacted element is an unknown function of the file /intranet/educar_tipo_ocorrencia_disciplinar_cad.php. Such manipulation of the argument nm_tipo/descricao leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9722 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar platform, affecting all versions up to 2.10. The vulnerability resides in the file /intranet/educar_tipo_ocorrencia_disciplinar_cad.php, specifically in the handling of the nm_tipo/descricao parameter. Improper sanitization or validation of this input allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., clicking a crafted link or visiting a malicious page). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but it requires user interaction. The impact primarily affects confidentiality and integrity by enabling theft of session cookies, credentials, or manipulation of displayed content, potentially leading to further attacks such as session hijacking or phishing. Availability impact is negligible. The vulnerability has been publicly disclosed, but no known exploits in the wild have been reported yet. The lack of an official patch link suggests that remediation may require vendor intervention or manual mitigation steps. Given the nature of the platform—an educational management system—this vulnerability could be leveraged to target educators, students, or administrative staff through social engineering or phishing campaigns, compromising sensitive educational data or user accounts.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk of unauthorized access to user sessions and sensitive data. Exploitation could lead to credential theft, unauthorized data modification, or distribution of malicious content within the educational environment. This could disrupt educational activities, damage institutional reputation, and violate data protection regulations such as GDPR if personal data is compromised. Since i-Educar is primarily used in educational contexts, the impact extends to students, teachers, and administrative personnel, potentially exposing minors to malicious content or privacy breaches. The medium severity score reflects a moderate risk, but the ease of remote exploitation and the lack of required privileges increase the urgency for mitigation. Additionally, the public disclosure of the vulnerability increases the likelihood of attempted exploitation, especially in environments with limited cybersecurity awareness or outdated software versions.
Mitigation Recommendations
1. Immediate mitigation should include input validation and output encoding on the affected parameters (nm_tipo/descricao) to neutralize malicious scripts. 2. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Educate users, especially staff and students, about the risks of clicking unknown links or opening suspicious content to reduce the chance of successful social engineering. 4. Monitor web server logs for suspicious requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5. If vendor patches become available, prioritize prompt application of updates to all affected systems. 6. Consider deploying Web Application Firewalls (WAF) with rules to detect and block XSS attack patterns targeting the i-Educar platform. 7. Conduct regular security assessments and code reviews of customizations or integrations with i-Educar to identify and remediate similar vulnerabilities. 8. Limit user privileges where possible to reduce the impact of compromised accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-30T13:35:09.269Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b401a4ad5a09ad00b5e9ec
Added to database: 8/31/2025, 8:02:44 AM
Last enriched: 8/31/2025, 8:17:58 AM
Last updated: 9/1/2025, 5:26:07 AM
Views: 9
Related Threats
CVE-2025-9772: Unrestricted Upload in RemoteClinic
MediumCVE-2025-9771: SQL Injection in SourceCodester Eye Clinic Management System
MediumCVE-2025-9770: SQL Injection in Campcodes Hospital Management System
MediumCVE-2025-9769: Command Injection in D-Link DI-7400G+
LowCVE-2025-9768: SQL Injection in itsourcecode Sports Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.