Home

Description

EN DE

A vulnerability was found in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /intranet/educar_tipo_regime_cad.php. Performing manipulation of the argument nm_tipo results in cross site scripting. The attack can be initiated remotely. The exploit has been made public and could be used.

Eine Schwachstelle wurde in Portabilis i-Educar up to 2.10 gefunden. Es geht um eine nicht näher bekannte Funktion der Datei /intranet/educar_tipo_regime_cad.php. Die Veränderung des Parameters nm_tipo resultiert in cross site scripting. Der Angriff kann über das Netzwerk angegangen werden. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden.

PUBLISHED Reserved 2025-08-30 | Published 2025-08-31 | Updated 2025-10-13 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
LOW: 3.5CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
4.0AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR

Problem types

Cross Site Scripting

Code Injection

Product status

2.0
affected

2.1
affected

2.2
affected

2.3
affected

2.4
affected

2.5
affected

2.6
affected

2.7
affected

2.8
affected

2.9
affected

2.10
affected

Timeline

2025-08-30:Advisory disclosed
2025-08-30:VulDB entry created
2025-10-13:VulDB entry last update

Credits

Karina Gante (CVE-Hunters) finder

karinagante (VulDB User) reporter

karinagante (VulDB User) analyst

References

vuldb.com/?id.322012 (VDB-322012 | Portabilis i-Educar educar_tipo_regime_cad.php cross site scripting) vdb-entry technical-description

vuldb.com/?ctiid.322012 (VDB-322012 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.638698 (Submit #638698 | Portabilis i-Educar 2.10 Cross Site Scripting) third-party-advisory

karinagante.github.io/cve-2025-9723/ related

karinagante.github.io/cve-2025-9723/ exploit

cve.org (CVE-2025-9723)

nvd.nist.gov (CVE-2025-9723)

Download JSON