CVE-2026-2064

3.5 LOW

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the User Data Page of Portabilis i-Educar through the /intranet/meusdadod.php file. The cross-site scripting (XSS) attack can be executed remotely, potentially affecting all users of the application. Systems running i-Educar version 2.10 and earlier are vulnerable.

💻 Affected Systems

Products:
  • Portabilis i-Educar
Versions: Up to and including version 2.10
Operating Systems: Any OS running i-Educar
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the /intranet/meusdadod.php component specifically. All installations with this file accessible are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to account compromise and data theft.

🟠

Likely Case

Attackers inject malicious scripts that execute in users' browsers, potentially stealing session tokens or displaying phishing content to users.

🟢

If Mitigated

With proper input validation and output encoding, the XSS payload would be neutralized before execution, preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available on GitHub and requires minimal technical skill to execute. Remote exploitation is confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization of the 'File' parameter in /intranet/meusdadod.php

Modify PHP code to validate and sanitize user input before processing

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to filter malicious requests

Configure WAF to block requests containing XSS payloads to /intranet/meusdadod.php

🧯 If You Can't Patch

  • Restrict access to /intranet/meusdadod.php using network controls or authentication
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Test by submitting XSS payloads to the 'File' parameter in /intranet/meusdadod.php and checking if they execute

Check Version:

Check i-Educar version in application configuration or admin panel

Verify Fix Applied:

Verify that XSS payloads are properly sanitized and do not execute in user browsers

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /intranet/meusdadod.php containing script tags or JavaScript payloads
  • Unusual parameter values in File parameter

Network Indicators:

  • HTTP POST/GET requests with suspicious payloads in File parameter
  • Requests containing common XSS vectors like <script>, javascript:, or onerror=

SIEM Query:

source="web_server" AND (url="/intranet/meusdadod.php" AND (param="File" AND value CONTAINS "<script>" OR value CONTAINS "javascript:"))

🔗 References

📤 Share & Export