Submit #618583: Portabilis I-educar 2.10 Cross Site Scriptinginfo

TitelPortabilis I-educar 2.10 Cross Site Scripting
BeschreibungSummary A Stored Cross-Site Scripting (XSS) vulnerability was identified in the atendidos_cad.php endpoint of the i-educar application. This vulnerability allows attackers to inject malicious scripts in the name and nome_social parameters. Details Vulnerable Endpoint: atendidos_cad.php Parameter: nome ,nome_social and email The application fails to validate and sanitize user inputs in the nm_instituicao parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. PoC Insert the payload "><img src=x onerror=alert('XSS-PoC')> in the Name or nome_social field then save: nome: image:https://github.com/CVE-Hunters/CVE/blob/main/images/xss006.png nome_social image:https://github.com/CVE-Hunters/CVE/blob/main/images/xss007.png Register the payload in the e-mail field at the atendidos_cad.php endpoint. After that, the XSS can be triggered by opening the atendidos_det.php endpoint. image:https://github.com/CVE-Hunters/CVE/blob/main/images/xss008.png image:https://github.com/CVE-Hunters/CVE/blob/main/images/xss009.png Impact User actions: Attackers can perform any action the user can, such as viewing, modifying, or initiating interactions with other users Data theft: Attackers can exfiltrate data or install malware on the user's machine Account compromise: Attackers can manipulate or steal cookies, or compromise confidential information Malicious code: Attackers can execute malicious code on the user's system Business reputation damage: Attackers can deface a corporate website or spread misinformation Misdirection: Attackers can change the instructions given to users, which can be dangerous if the target is a government website or provides vital resources Natan Maia Morette by CVE-Hunters
Quelle⚠️ https://github.com/CVE-Hunters/CVE/blob/main/i-educar/Stored%20Cross-Site%20Scripting%20XSS%20in%20atendidos_cad.php%20via%20nome%2C%20nome_social%2C%20and%20email%20Parameters.md
Benutzer
 nmmorette (UID 87361)
Einreichung18.07.2025 20:03 (vor 9 Monaten)
Moderieren30.07.2025 18:37 (12 days later)
StatusAkzeptiert
VulDB Eintrag318337 [Portabilis i-Educar 2.10 atendidos_cad.php nome/nome_social/email Cross Site Scripting]
Punkte20

Want to know what is going to be exploited?

We predict KEV entries!