Description
A vulnerability was found in Portabilis i-Educar up to 2.10. This issue affects some unknown processing of the file /intranet/educar_instituicao_cad.php of the component Editar Page. The manipulation of the argument neighborhood name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Dies betrifft einen unbekannten Teil der Datei /intranet/educar_instituicao_cad.php der Komponente Editar Page. Durch Manipulieren des Arguments neighborhood name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
Problem types
Product status
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
Timeline
2025-08-13: | Advisory disclosed |
2025-08-13: | VulDB entry created |
2025-08-13: | VulDB entry last update |
Credits
Fernanda Martins
FeeMarb (VulDB User)
References
vuldb.com/?id.319877 (VDB-319877 | Portabilis i-Educar Editar educar_instituicao_cad.php cross site scripting)
vuldb.com/?ctiid.319877 (VDB-319877 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.629164 (Submit #629164 | Portabilis i-Educar 2.10 Cross Site Scripting)
github.com/...ituicao_cad.php parameter neighborhood name.md