i-Educar 2.10.0 - Stored Cross-Site Scripting (XSS) in admin panel

4,8

Medium

4,8

Medium

Discovered by

Marcelo Queiroz

External Pentester

Summary

Full name

i-Educar 2.10.0 - Stored Cross-Site Scripting (XSS) in matricula_interna parameter of educar_usuario_cad.php

Code name

State

Public

Release date

9 dic 2025

Affected product

i-Educar

Vendor

Portabilis

Affected version(s)

2.10.0

Vulnerability name

Stored cross-site scripting (XSS)

Remotely exploitable

Yes

CVSS v4.0 vector string

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

CVSS v4.0 base score

4.8

Exploit available

Yes

CVE ID(s)

Description

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the educar_usuario_cad.php endpoint of the i-Educar application. The issue arises because the matricula_interna parameter is not sanitized before being stored in the database. Malicious scripts injected into this field persist in the system and are executed whenever the affected record is displayed in the web interface, leading to a persistent client-side compromise.

Vulnerability

The application fails to properly validate or encode user input in the Matrícula Interna field (matricula_interna). An attacker can inject arbitrary JavaScript code into this field, which is stored in the backend database. Whenever the admin later views the affected record, the malicious payload executes in their browser context.

It is important to note that this vulnerability works from admin to admin. Administrator permissions are required, and it only affects other users with access to the administrative panel.

PoC

><svg/onload=alert(16)
Steps to reproduce:
  1. Log in with an account that can create or edit users.

  2. Navigate to Configurações → Permissões → Usuários

  3. Create a new user or edit an existing one.

  4. In the Matrícula Interna field, insert the payload

  5. Save changes.

  1. Open the affected user record.

  2. The payload executes immediately, confirming the stored XSS.

Evidence of Exploitation

Our security policy

We have reserved the ID CVE-2025-9638 to refer to this issue from now on.

Disclosure policy

System Information

  • i-Educar

  • Version 2.10.0

  • Operating System: Any

References

Credits

The vulnerability was discovered by Marcelo Queiroz, an independent security researcher.

Timeline

10 ago 2025

Vulnerability discovered

1 sept 2025

Vendor contacted

9 sept 2025

Vendor replied

15 sept 2025

Follow-up with vendor

9 dic 2025

Public disclosure

Does your application use this vulnerable software?

During our free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.

Las soluciones de Fluid Attacks permiten a las organizaciones identificar, priorizar y remediar vulnerabilidades en su software a lo largo del SDLC. Con el apoyo de la IA, herramientas automatizadas y pentesters, Fluid Attacks acelera la mitigación de la exposición al riesgo de las empresas y fortalece su postura de ciberseguridad.

SOC 2 Type II

SOC 3

Lee un resumen de Fluid Attacks

Suscríbete a nuestro boletín

Mantente al día sobre nuestros próximos eventos y los últimos blog posts, advisories y otros recursos interesantes.

Las soluciones de Fluid Attacks permiten a las organizaciones identificar, priorizar y remediar vulnerabilidades en su software a lo largo del SDLC. Con el apoyo de la IA, herramientas automatizadas y pentesters, Fluid Attacks acelera la mitigación de la exposición al riesgo de las empresas y fortalece su postura de ciberseguridad.

SOC 2 Type II

SOC 3

Suscríbete a nuestro boletín

Mantente al día sobre nuestros próximos eventos y los últimos blog posts, advisories y otros recursos interesantes.

Mantente al día sobre nuestros próximos eventos y los últimos blog posts, advisories y otros recursos interesantes.

Las soluciones de Fluid Attacks permiten a las organizaciones identificar, priorizar y remediar vulnerabilidades en su software a lo largo del SDLC. Con el apoyo de la IA, herramientas automatizadas y pentesters, Fluid Attacks acelera la mitigación de la exposición al riesgo de las empresas y fortalece su postura de ciberseguridad.

SOC 2 Type II

SOC 3

Suscríbete a nuestro boletín

Mantente al día sobre nuestros próximos eventos y los últimos blog posts, advisories y otros recursos interesantes.

Mantente al día sobre nuestros próximos eventos y los últimos blog posts, advisories y otros recursos interesantes.