A vulnerability was identified in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_projeto_cad.php of the component Cadastrar projeto Page. Such manipulation of the argument nome/observacao leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://karinagante.github.io/cve-2025-9653/ | Exploit Third Party Advisory |
| https://karinagante.github.io/cve-2025-9653/#proof-of-concept-poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.321861 | Permissions Required VDB Entry |
| https://vuldb.com/?id.321861 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.636957 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-08-29 15:15
Updated : 2025-09-04 18:16
NVD link : CVE-2025-9653
Mitre link : CVE-2025-9653
CVE.ORG link : CVE-2025-9653
JSON object : View
Products Affected
portabilis
- i-educar
