CVE-2025-8544

Stored XSS in i-Educar via RegraAvaliacao/edit (With PoC and Screenshots)

🇧🇷 Ler em Português.

While analyzing the grading rules feature in the i-Educar system, I found a stored XSS vulnerability in the /module/RegraAvaliacao/edit endpoint. The nome parameter — responsible for storing the name of a grading rule — accepts JavaScript payloads without any input sanitization or validation.
The injected script is stored on the server and automatically executed when the grading rules listing page is accessed.
In this post, I’ll show how the vulnerability was exploited in practice, including a step-by-step Proof of Concept (PoC), screenshots, and an overview of the potential real-world impact this flaw introduces.

CVE-2025-8544 refers to a stored Cross-Site Scripting (XSS) vulnerability in the /module/RegraAvaliacao/edit endpoint of the i-Educar application.
The issue lies in the nome parameter, which defines the name of a grading rule. When malicious JavaScript is injected into this field, it is saved on the server and executed automatically when users access the /module/RegraAvaliacao/index page.

Vulnerable Endpoint: /module/RegraAvaliacao/edit

Affected Parameter: nome

Trigger Page: /module/RegraAvaliacao/index

Payload Used

"><img src=x onerror=alert('CVE-Hunters')>

To reproduce the vulnerability:

Access the endpoint: /module/RegraAvaliacao/edit

Insert the payload in the second field: “Nome”

Fill out the other required fields with any value

Click on: “Salvar”

The /module/RegraAvaliacao/index page will load automatically and the payload will be triggered:

Parameter nome
Report

You can view the full technical report here:

CVE-2025-8544 Report

This Cross-Site Scripting (XSS) vulnerability can be exploited to:

  • Steal session cookies (session hijacking);
  • Install malware on victims’ devices;
  • Steal credentials stored in the browser;
  • Redirect users to malicious websites;
  • Deface the application interface;
  • Damage the institutional reputation.

The vulnerability was ethically reported and published as:

CVE-2025-8544 shows how even simple administrative fields — like the name of a grading rule — can become attack vectors when input validation is missing.
It's essential to apply strict input validation and output encoding across the entire application, especially in admin interfaces where the consequences of XSS would be severe.

Discovered with💜 by Karina Gante.

LinkedIn GitHub gmail Instagram

Official Member of CVE-Hunters🏹

Related Content