CVE-2025-9723: Cross Site Scripting in Portabilis i-Educar
A vulnerability was found in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /intranet/educar_tipo_regime_cad.php. Performing manipulation of the argument nm_tipo results in cross site scripting. The attack can be initiated remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-9723 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar software, specifically affecting versions up to 2.10. The vulnerability resides in an unspecified function within the file /intranet/educar_tipo_regime_cad.php. The issue arises when the argument 'nm_tipo' is manipulated, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload. The CVSS 4.0 base score is 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P). The vulnerability impacts the integrity of the application by allowing script injection, which can lead to session hijacking, defacement, or redirection to malicious sites. No known exploits are currently reported in the wild, but a public exploit has been made available, increasing the risk of exploitation. The vulnerability does not affect confidentiality or availability directly, but the injected scripts can be leveraged for further attacks against users or the system.
Potential Impact
For European organizations using Portabilis i-Educar, particularly educational institutions, this vulnerability poses a risk of client-side attacks that could compromise user sessions, steal credentials, or deliver malware. Since i-Educar is an education management system, exploitation could disrupt administrative processes or expose sensitive student and staff data indirectly through session hijacking or phishing. The remote exploitability without authentication increases the threat surface, especially in environments where the intranet portal is accessible externally or insufficiently segmented. The medium severity suggests moderate risk, but the presence of a public exploit elevates urgency for mitigation. Organizations in Europe relying on this software for school management could face reputational damage, regulatory scrutiny under GDPR if personal data is compromised, and operational disruptions.
Mitigation Recommendations
To mitigate CVE-2025-9723, organizations should prioritize applying patches or updates from Portabilis as soon as they become available. In the absence of official patches, implement input validation and output encoding on the 'nm_tipo' parameter to neutralize malicious scripts. Employ web application firewalls (WAFs) configured to detect and block XSS payloads targeting the affected endpoint. Restrict access to the intranet portal hosting i-Educar to trusted networks and enforce strict segmentation to limit exposure. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the portal. Regularly audit logs for unusual activity indicative of exploitation attempts. Additionally, implement Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom
CVE-2025-9723: Cross Site Scripting in Portabilis i-Educar
Description
A vulnerability was found in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /intranet/educar_tipo_regime_cad.php. Performing manipulation of the argument nm_tipo results in cross site scripting. The attack can be initiated remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9723 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Educar software, specifically affecting versions up to 2.10. The vulnerability resides in an unspecified function within the file /intranet/educar_tipo_regime_cad.php. The issue arises when the argument 'nm_tipo' is manipulated, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload. The CVSS 4.0 base score is 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P). The vulnerability impacts the integrity of the application by allowing script injection, which can lead to session hijacking, defacement, or redirection to malicious sites. No known exploits are currently reported in the wild, but a public exploit has been made available, increasing the risk of exploitation. The vulnerability does not affect confidentiality or availability directly, but the injected scripts can be leveraged for further attacks against users or the system.
Potential Impact
For European organizations using Portabilis i-Educar, particularly educational institutions, this vulnerability poses a risk of client-side attacks that could compromise user sessions, steal credentials, or deliver malware. Since i-Educar is an education management system, exploitation could disrupt administrative processes or expose sensitive student and staff data indirectly through session hijacking or phishing. The remote exploitability without authentication increases the threat surface, especially in environments where the intranet portal is accessible externally or insufficiently segmented. The medium severity suggests moderate risk, but the presence of a public exploit elevates urgency for mitigation. Organizations in Europe relying on this software for school management could face reputational damage, regulatory scrutiny under GDPR if personal data is compromised, and operational disruptions.
Mitigation Recommendations
To mitigate CVE-2025-9723, organizations should prioritize applying patches or updates from Portabilis as soon as they become available. In the absence of official patches, implement input validation and output encoding on the 'nm_tipo' parameter to neutralize malicious scripts. Employ web application firewalls (WAFs) configured to detect and block XSS payloads targeting the affected endpoint. Restrict access to the intranet portal hosting i-Educar to trusted networks and enforce strict segmentation to limit exposure. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the portal. Regularly audit logs for unusual activity indicative of exploitation attempts. Additionally, implement Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-30T13:35:11.896Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b41338ad5a09ad00b6ca01
Added to database: 8/31/2025, 9:17:44 AM
Last enriched: 8/31/2025, 9:32:43 AM
Last updated: 9/1/2025, 8:51:07 AM
Views: 12
Related Threats
CVE-2025-9783: Buffer Overflow in TOTOLINK A702R
HighCVE-2025-33102: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in IBM Concert Software
MediumCVE-2025-33099: CWE-295 Improper Certificate Validation in IBM Concert Software
MediumCVE-2025-33084: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in IBM Concert Software
MediumCVE-2025-33083: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Concert Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.