CVE-2025-8543

Stored XSS in i-Educar via educar_raca_cad.php (With PoC and Screenshots)

🇧🇷 Ler em Português.

While reviewing the ethnic group classification module of the i-Educar system, I discovered a stored XSS vulnerability in the /intranet/educar_raca_cad.php endpoint. The nm_raca parameter — responsible for registering a person’s ethnic group — fails to sanitize user input, allowing malicious scripts to be injected and stored on the server. When the ethnic group listing page is accessed, the payload is executed automatically, potentially compromising user data.
In this post, I’ll show how the vulnerability was identified and exploited in practice, including a working Proof of Concept (PoC), screenshots of the execution, and a breakdown of the real-world risks this flaw can introduce to production environments.

CVE-2025-8543 is a stored Cross-Site Scripting (XSS) vulnerability found in the /intranet/educar_raca_cad.php endpoint of the i-Educar application.
The vulnerability affects the nm_raca parameter, which is used to define a person’s ethnic group. When unsanitized input is saved, it becomes a persistent attack vector that is triggered on the page /intranet/educar_raca_lst.php.

Vulnerable Endpoint: /intranet/educar_raca_cad.php

Affected Parameter: nm_raca

Trigger Page: /intranet/educar_raca_lst.php

Payload Used

"><img src=x onerror=alert('CVE-Hunters')>

To reproduce this vulnerability, follow the steps below:

Access the endpoint: /intranet/educar_raca_cad.php

Insert the payload in the “Raça” (Ethnic Group) field Nome

Click on: “Salvar”

The /intranet/educar_raca_lst.php page will automatically load and execute the XSS:

Parameter nm_raca
Report

You can view the full technical report here:

CVE-2025-8543 Report

This Cross-Site Scripting (XSS) vulnerability can be exploited to:

  • Steal session cookies (session hijacking);
  • Install malware on victims’ devices;
  • Steal credentials stored in the browser;
  • Redirect users to malicious websites;
  • Deface the application interface;
  • Damage the institutional reputation.

The vulnerability was ethically reported and published as:

CVE-2025-8543 reinforces that all input fields — even those related to demographic data like ethnic group — must be properly validated and encoded.
Ignoring sanitization on administrative pages creates long-lasting security issues that are easily exploitable. Always treat user input as untrusted.

Discovered with💜 by Karina Gante.

LinkedIn GitHub gmail Instagram

Official Member of CVE-Hunters🏹

Related Content