Reflected Cross-Site Scripting in i-Educar
Description
i-Educar is free, fully online school management software that can be used by school secretaries, teachers, coordinators, and area managers. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the dynamic generation of HTML fields prior to the 2.9 branch. The file located at ieducar/intranet/include/clsCampos.inc.php does not properly validate or sanitize user-controlled input, leading to the vulnerability. Any page that uses this implementation is vulnerable, such as intranet/educar_curso_lst.php?nm_curso=<payload>, intranet/atendidos_lst.php?nm_pessoa=<payload>, intranet/educar_abandono_tipo_lst?nome=<payload>. Commit f2d768534aabc09b2a1fc8a5cc5f9c93925cb273 contains a patch for the issue.
Affected products
1- Range: < 2.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/portabilis/i-educar/commit/f2d768534aabc09b2a1fc8a5cc5f9c93925cb273mitrex_refsource_MISC
- github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwjmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.