CVE-2025-7867

A vulnerability has been found in Portabilis i-Educar 2.9.0/2.10.0. This vulnerability affects unknown code of the file /intranet/agenda.php of the component Agenda Module. The manipulation of the argument novo_titulo/novo_descricao leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README17.md Broken Link
https://vuldb.com/?ctiid.316980 Permissions Required VDB Entry
https://vuldb.com/?id.316980 Third Party Advisory VDB Entry
https://vuldb.com/?submit.605633 Third Party Advisory VDB Entry
https://vuldb.com/?submit.618639 Third Party Advisory VDB Entry
https://vuldb.com/?submit.628435 Third Party Advisory VDB Entry
https://vuldb.com/?submit.605633 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-07-20 05:15

Updated : 2025-09-27 00:28


NVD link : CVE-2025-7867

Mitre link : CVE-2025-7867

CVE.ORG link : CVE-2025-7867


JSON object : View

Products Affected

portabilis

  • i-educar
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')