A weakness has been identified in Portabilis i-Educar up to 2.10. This issue affects some unknown processing of the file /module/Configuracao/ConfiguracaoMovimentoGeral. This manipulation of the argument tipoacao causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10606.md | Exploit Third Party Advisory |
| https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Reflected%20endpoint%20%60.module.Configuracao.ConfiguracaoMovimentoGeral%60%20parameter%20%60tipoacao%60.md | Broken Link |
| https://vuldb.com/?ctiid.324626 | Permissions Required VDB Entry |
| https://vuldb.com/?id.324626 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.649874 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-09-17 18:15
Updated : 2025-09-18 20:22
NVD link : CVE-2025-10606
Mitre link : CVE-2025-10606
CVE.ORG link : CVE-2025-10606
JSON object : View
Products Affected
portabilis
- i-educar
