Impact
The vulnerability resides in the file /intranet/educar_servidor_curso_lst.php of Portabilis i‑Educar 2.11. Manipulation of the Name parameter leads to the injection and execution of arbitrary JavaScript within the victim’s browser, enabling attackers to perform actions such as stealing session cookies, defacing content, or conducting phishing attacks. The weakness is identified by CWE‑79 (XSS) and CWE‑94 (Code Injection). The attack may be initiated remotely and the exploit has been publicly disclosed, allowing unprivileged attackers to trigger it via crafted requests.
Affected Systems
Portabilis i‑Educar 2.11 is affected. The CPE identifier for the product is cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*. No other versions or products are listed as impacted.
Risk and Exploitability
The CVSS score is 5.1, indicating moderate severity. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog. Because the exploit can be executed remotely and is publicly available, the likelihood of attack is high; however, the damage is confined to the browser environment of authenticated or unauthenticated users who interact with the affected endpoint. No vendor‑supplied solution or workaround is currently documented, so the risk remains until remediation is applied.
OpenCVE Enrichment