A weakness has been identified in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_usuario_cad.php of the component Editar usuário Page. This manipulation of the argument email/data_inicial/data_expiracao causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10099.md | Exploit Third Party Advisory |
| https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Reflected%20endpoint%20%60educar_usuario_cad.php%60%20parameters%20%60email%60,%20%60data_inicial%60,%20%60data_expiracao%60.md | Broken Link |
| https://vuldb.com/?ctiid.323060 | Permissions Required VDB Entry |
| https://vuldb.com/?id.323060 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.644967 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-09-08 18:15
Updated : 2025-09-11 15:39
NVD link : CVE-2025-10099
Mitre link : CVE-2025-10099
CVE.ORG link : CVE-2025-10099
JSON object : View
Products Affected
portabilis
- i-educar
