i-Educar 2.10.0 - Stored Cross-Site Scripting (XSS) in admin panel

4.8

Medium

4.8

Medium

Discovered by

Marcelo Queiroz

External Pentester

Summary

Full name

i-Educar 2.10.0 - Stored Cross-Site Scripting (XSS) in matricula_interna parameter of educar_usuario_cad.php

Code name

State

Public

Release date

Dec 9, 2025

Affected product

i-Educar

Vendor

Portabilis

Affected version(s)

2.10.0

Vulnerability name

Stored cross-site scripting (XSS)

Remotely exploitable

Yes

CVSS v4.0 vector string

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

CVSS v4.0 base score

4.8

Exploit available

Yes

CVE ID(s)

Description

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the educar_usuario_cad.php endpoint of the i-Educar application. The issue arises because the matricula_interna parameter is not sanitized before being stored in the database. Malicious scripts injected into this field persist in the system and are executed whenever the affected record is displayed in the web interface, leading to a persistent client-side compromise.

Vulnerability

The application fails to properly validate or encode user input in the Matrícula Interna field (matricula_interna). An attacker can inject arbitrary JavaScript code into this field, which is stored in the backend database. Whenever the admin later views the affected record, the malicious payload executes in their browser context.

It is important to note that this vulnerability works from admin to admin. Administrator permissions are required, and it only affects other users with access to the administrative panel.

PoC

><svg/onload=alert(16)
Steps to reproduce:
  1. Log in with an account that can create or edit users.

  2. Navigate to Configurações → Permissões → Usuários

  3. Create a new user or edit an existing one.

  4. In the Matrícula Interna field, insert the payload

  5. Save changes.

  1. Open the affected user record.

  2. The payload executes immediately, confirming the stored XSS.

Evidence of Exploitation

Our security policy

We have reserved the ID CVE-2025-9638 to refer to this issue from now on.

Disclosure policy

System Information

  • i-Educar

  • Version 2.10.0

  • Operating System: Any

References

Credits

The vulnerability was discovered by Marcelo Queiroz, an independent security researcher.

Timeline

Aug 10, 2025

Vulnerability discovered

Sep 1, 2025

Vendor contacted

Sep 9, 2025

Vendor replied

Sep 15, 2025

Follow-up with vendor

Dec 9, 2025

Public disclosure

Does your application use this vulnerable software?

During our free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Get an AI summary of Fluid Attacks

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2025 Fluid Attacks. We hack your software.