i-Educar is free, fully online school management software. Version 2.9 of the application fails to properly validate and sanitize user supplied input, leading to a stored cross-site scripting vulnerability that resides within the user type (Tipo de Usuário) input field. Through this attacker vector a malicious user might be able to retrieve information belonging to another user, which may lead to sensitive information leakage or other malicious actions. As of time of publication, no patched versions are known to exist.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 17 Jun 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Portabilis
Portabilis i-educar |
|
| CPEs | cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Portabilis
Portabilis i-educar |
|
| Metrics |
cvssV3_1
|
Thu, 08 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 May 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | i-Educar is free, fully online school management software. Version 2.9 of the application fails to properly validate and sanitize user supplied input, leading to a stored cross-site scripting vulnerability that resides within the user type (Tipo de Usuário) input field. Through this attacker vector a malicious user might be able to retrieve information belonging to another user, which may lead to sensitive information leakage or other malicious actions. As of time of publication, no patched versions are known to exist. | |
| Title | i-Educar Stored Cross-Site Scripting vulnerability | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-07T23:49:46.016Z
Updated: 2025-05-08T13:58:11.917Z
Reserved: 2024-12-10T14:47:08.666Z
Link: CVE-2024-55651
Updated: 2025-05-08T13:58:07.165Z
Status : Analyzed
Published: 2025-05-08T00:15:15.853
Modified: 2025-06-17T19:44:30.790
Link: CVE-2024-55651
No data.