A flaw has been found in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_tipo_ensino_cad.php. Executing manipulation of the argument nm_tipo can lead to cross site scripting. The attack can be executed remotely. The exploit has been published and may be used.
References
| Link | Resource |
|---|---|
| https://karinagante.github.io/cve-2025-9738/ | Exploit Third Party Advisory |
| https://karinagante.github.io/cve-2025-9738/#proof-of-concept-poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.322037 | Permissions Required VDB Entry |
| https://vuldb.com/?id.322037 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.638703 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-08-31 17:15
Updated : 2025-09-27 00:28
NVD link : CVE-2025-9738
Mitre link : CVE-2025-9738
CVE.ORG link : CVE-2025-9738
JSON object : View
Products Affected
portabilis
- i-educar
