A weakness has been identified in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /intranet/educar_funcao_cad.php of the component Editar Função Page. This manipulation of the argument abreviatura/tipoacao causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
References
Link | Resource |
---|---|
https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Stored%20endpoint%20%60educar_funcao_cad.php%60%20parameters%20%60abreviatura%60,%20%60tipoacao%60.md | Broken Link |
https://vuldb.com/?ctiid.324608 | Permissions Required VDB Entry |
https://vuldb.com/?id.324608 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.648837 | Third Party Advisory VDB Entry |
Configurations
History
18 Sep 2025, 20:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:* | |
First Time |
Portabilis
Portabilis i-educar |
|
References | () https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Stored%20endpoint%20%60educar_funcao_cad.php%60%20parameters%20%60abreviatura%60,%20%60tipoacao%60.md - Broken Link | |
References | () https://vuldb.com/?ctiid.324608 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.324608 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.648837 - Third Party Advisory, VDB Entry |
17 Sep 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-17 11:15
Updated : 2025-09-18 20:23
NVD link : CVE-2025-10591
Mitre link : CVE-2025-10591
CVE.ORG link : CVE-2025-10591
JSON object : View
Products Affected
portabilis
- i-educar