Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4355: Cross Site Scripting in Portabilis i-Educar

0
Medium
VulnerabilityCVE-2026-4355cvecve-2026-4355
Published: Tue Mar 17 2026 (03/17/2026, 23:32:14 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

CVE-2026-4355 is a medium severity cross-site scripting (XSS) vulnerability found in Portabilis i-Educar version 2. 11, specifically in the /intranet/educar_servidor_curso_lst. php file. The vulnerability arises from improper sanitization of the 'Name' argument, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction, such as a victim clicking a crafted link. The vendor has not responded to disclosure attempts, and no patches are currently available. Although no known exploits are in the wild, the exploit code is publicly available, increasing the risk of attacks. This vulnerability can lead to session hijacking, credential theft, or unauthorized actions within the affected web application. Organizations using i-Educar 2. 11 should prioritize mitigation to prevent exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:00:02 UTC

Technical Analysis

CVE-2026-4355 is a cross-site scripting vulnerability identified in Portabilis i-Educar version 2.11, a widely used open-source educational management system. The vulnerability exists in the /intranet/educar_servidor_curso_lst.php endpoint, where the 'Name' parameter is improperly sanitized, allowing attackers to inject malicious JavaScript code. This flaw enables remote attackers to craft URLs or input that, when processed by the vulnerable endpoint, execute arbitrary scripts in the context of the victim's browser. The vulnerability does not require authentication, lowering the barrier for exploitation, but does require user interaction, such as clicking a malicious link or visiting a compromised page. The CVSS 4.0 base score is 5.1, reflecting medium severity due to the limited impact on confidentiality and integrity but the potential for session hijacking or phishing. The vendor has not issued any patches or responses, and the exploit code is publicly available, increasing the risk of exploitation. No known active exploitation has been reported yet. The vulnerability affects educational institutions and organizations using i-Educar 2.11, potentially exposing sensitive student and staff data or enabling unauthorized actions within the system. The lack of vendor response complicates remediation efforts, necessitating alternative mitigation strategies.

Potential Impact

The primary impact of CVE-2026-4355 is the potential for attackers to execute arbitrary JavaScript in the context of users accessing the vulnerable i-Educar system. This can lead to session hijacking, theft of authentication tokens, redirection to malicious websites, or unauthorized actions performed on behalf of the victim. For educational institutions, this could compromise sensitive student and staff information, disrupt administrative operations, and damage trust in the system. The vulnerability's remote exploitability and lack of authentication requirements increase its risk profile. Although the vulnerability does not directly affect system availability or integrity at a high level, the indirect consequences of successful exploitation—such as data leakage or unauthorized access—can be significant. The public availability of exploit code raises the likelihood of opportunistic attacks, especially against less-secured deployments. Organizations worldwide using i-Educar 2.11 face reputational damage, regulatory compliance issues, and potential operational disruptions if exploited.

Mitigation Recommendations

Given the absence of an official patch from the vendor, organizations should implement the following specific mitigations: 1) Apply strict input validation and output encoding on the 'Name' parameter at the web application or reverse proxy level to neutralize malicious scripts. 2) Deploy a Web Application Firewall (WAF) with rules targeting common XSS attack patterns, specifically tuned for i-Educar endpoints. 3) Restrict access to the /intranet/educar_servidor_curso_lst.php endpoint to trusted IP ranges or authenticated users where possible, reducing exposure. 4) Conduct user awareness training to recognize and avoid phishing attempts that exploit this vulnerability. 5) Monitor web server and application logs for suspicious requests containing script tags or unusual payloads targeting the vulnerable parameter. 6) Consider isolating or segmenting the i-Educar system within the network to limit lateral movement if compromised. 7) Regularly review and update security controls and prepare for patch deployment once the vendor releases an official fix. 8) If feasible, upgrade to a later, unaffected version of i-Educar or apply community-developed patches after thorough testing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-17T18:32:46.571Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b9e71a771bdb1749eb4c77

Added to database: 3/17/2026, 11:43:22 PM

Last enriched: 3/25/2026, 1:00:02 AM

Last updated: 4/30/2026, 3:29:31 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses