| शीर्षक | Portabilis i-educar 2.10 Cross Site Scripting |
|---|
| विवरण | # Cross-Site Scripting (XSS) Stored endpoint `/usuarios/tipos/(ID)` parameters `"Tipos de Usuário"`, `"Descrição"`
---
## Summary
A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `/usuarios/tipos/(ID)` endpoint of the _i-educar_ application. This vulnerability allows attackers to inject malicious scripts into the **"Tipos de Usuário"** and **"Descrição"** fields. The injected payload is stored on the server and is automatically executed in the browser of any user who accesses the affected user type entry, creating a persistent attack vector.
---
## Details
App: i-educar v 2.10
**Vulnerable Endpoint:** `POST /usuarios/tipos/(ID)`
**Parameters:** `"Tipos de Usuário"`, `"Descrição"`
The application fails to properly validate and sanitize user input in the `"Tipos de Usuário"` and `"Descrição"` fields. As a result, attackers can inject arbitrary JavaScript code which is stored in the database and executed when the stored content is viewed through the application’s interface.
---
## PoC
**Payload:**
`"><script>alert('XSS-PoC-Tipo')</script>`
### Steps to Reproduce:
1. Log in to the _i-educar_ application using an account with permissions to create or edit user types.
2. Navigate to **Configurações > Permissões > Tipos de Usuário** and click **"Edit"** on an existing user type or **"Add"** to create a new one.
3. In the **"Tipos de Usuário"** and/or **"Descrição"** fields, insert the payload above:
`"><script>alert('XSS-PoC-Tipo')</script>`
![[Pasted image 20250809201533.png]]
4. Click **Save**.
5. The stored payload is executed immediately in the browser, confirming the Stored XSS vulnerability.
![[Pasted image 20250809201623.png]]
---
## Impact
Stored XSS vulnerabilities can lead to:
- **Session hijacking:** Stealing cookies or authentication tokens to impersonate users
- **Credential theft:** Capturing usernames and passwords through injected scripts
- **Malware delivery:** Serving malicious code to application users
- **Privilege escalation:** Exploiting admin accounts via persistent scripts
- **Content manipulation:** Altering displayed application data
- **Reputation damage:** Eroding trust among users and stakeholders |
|---|
| स्रोत | ⚠️ https://github.com/marcelomulder/CVE/blob/main/i-educar/Cross-Site%20Scripting%20(XSS)%20Stored%20endpoint%20%60.usuarios.tipos.(ID)%60%20parameters%20%60Tipos%20de%20Usu%C3%A1rio%60,%20%60Descri%C3%A7%C3%A3o%60.md |
|---|
| उपयोगकर्ता | marceloQz (UID 87549) |
|---|
| सबमिशन | 29/08/2025 04:34 PM (8 महीनों पहले) |
|---|
| संयम | 07/09/2025 01:45 PM (9 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 323022 [Portabilis i-Educar तक 2.10 /usuarios/tipos/ Tipos de Usuário/Descrição क्रॉस साइट स्क्रिप्टिंग] |
|---|
| अंक | 20 |
|---|