Cross-Site Scripting Vulnerability in Portabilis i-Educar Application
CVE-2025-8918

4.8MEDIUM

Key Information:

Vendor

Portabilis

Status
Vendor
CVE Published:
13 August 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-8918?

A cross-site scripting vulnerability exists in the Portabilis i-Educar application, specifically in the 'Editar Page' component. The vulnerability is triggered through improper handling of the 'neighborhood name' argument in the /intranet/educar_instituicao_cad.php file. Attackers can exploit this vulnerability remotely, potentially leading to the execution of malicious scripts in the context of a user's session. This issue has been publicly disclosed, and despite efforts to notify the vendor, there has been no response regarding the matter.

Affected Version(s)

i-Educar 2.0

i-Educar 2.1

i-Educar 2.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Fernanda Martins
FeeMarb (VulDB User)
.
CVE-2025-8918 : Cross-Site Scripting Vulnerability in Portabilis i-Educar Application