i-Educar is free, fully online school management software. Version 2.9 of the application fails to properly validate and sanitize user supplied input, leading to a stored cross-site scripting vulnerability that resides within the user type (Tipo de Usuário) input field. Through this attacker vector a malicious user might be able to retrieve information belonging to another user, which may lead to sensitive information leakage or other malicious actions. As of time of publication, no patched versions are known to exist.
References
Link | Resource |
---|---|
https://github.com/portabilis/i-educar/security/advisories/GHSA-8fjj-9937-g84w | Exploit Third Party Advisory |
Configurations
History
17 Jun 2025, 19:44
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CPE | cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:* | |
First Time |
Portabilis
Portabilis i-educar |
|
References | () https://github.com/portabilis/i-educar/security/advisories/GHSA-8fjj-9937-g84w - Exploit, Third Party Advisory |
08 May 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 May 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-08 00:15
Updated : 2025-06-17 19:44
NVD link : CVE-2024-55651
Mitre link : CVE-2024-55651
CVE.ORG link : CVE-2024-55651
JSON object : View
Products Affected
portabilis
- i-educar
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')