Cross-Site Scripting Vulnerability in Portabilis i-Educar Software
CVE-2025-10591

5.1MEDIUM

Key Information:

Vendor

Portabilis

Status
Vendor
CVE Published:
17 September 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-10591?

A vulnerability has been discovered in Portabilis i-Educar, affecting versions up to 2.10. This weakness is present in the Editar Função Page, specifically within the /intranet/educar_funcao_cad.php file, where improper validation of user inputs allows for cross-site scripting attacks. Attackers can exploit this vulnerability remotely by manipulating the abreviatura and tipoacao parameters, potentially jeopardizing user sessions and exposing sensitive information. Publicly available exploits increase the urgency for users to review their security measures.

Affected Version(s)

i-Educar 2.0

i-Educar 2.1

i-Educar 2.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

marceloQz (VulDB User)
.
CVE-2025-10591 : Cross-Site Scripting Vulnerability in Portabilis i-Educar Software