CVE-2025-8545

Stored XSS in i-Educar via educar_motivo_afastamento_cad.php (with PoC and Screenshots)

🇧🇷 Ler em Português.

While exploring the module responsible for managing leave reasons in the i-Educar system, I discovered a stored XSS vulnerability in the /intranet/educar_motivo_afastamento_cad.php endpoint. The nm_motivo parameter — used to define reasons for school absences — allows the injection of malicious scripts without any sanitization.
These scripts are stored in the database and executed automatically when the corresponding listing page is accessed.
In this post, I’ll walk you through the technical details, how the vulnerability was exploited (PoC), screenshots with real evidence, and the security risks it represents in real-world environments.

The CVE-2025-8545 is a Stored Cross-Site Scripting (XSS) vulnerability found in the /intranet/educar_motivo_afastamento_cad.php endpoint of the i-Educar application.
The nm_motivo parameter fails to properly validate user inputs, allowing attackers to persist JavaScript payloads on the server. The malicious code is executed when the /intranet/educar_motivo_afastamento_lst.php page is loaded, impacting any user who visits it.

Vulnerable Endpoint: /intranet/educar_motivo_afastamento_cad.php

Affected Parameter: nm_motivo

Trigger Page: /intranet/educar_motivo_afastamento_lst.php

Payload Used

"><img src=x onerror=alert('CVE-Hunters')>

To reproduce the vulnerability:

Access the endpoint: /intranet/educar_motivo_afastamento_cad.php

Select the default option in the “Instituição” field

Insert the payload in the “Motivo de Afastamento” field

Click on: “Salvar”

The /intranet/educar_motivo_afastamento_lst.php page will automatically load, triggering the malicious payload:

Parameter nm_motivo
Report

You can access the full technical report with all step-by-step evidence here:

CVE-2025-8545 Report

This Cross-Site Scripting (XSS) vulnerability can be exploited to:

  • Steal session cookies (session hijacking);
  • Install malware on victims’ devices;
  • Steal credentials stored in the browser;
  • Redirect users to malicious websites;
  • Deface the application interface;
  • Damage the institutional reputation.

This vulnerability was reported responsibly and is publicly registered as:

CVE-2025-8545 shows how even seemingly harmless fields — like a simple reason for school absence — can become serious entry points for attacks if user input isn't properly sanitized.
Educational systems must implement secure development practices across the entire application lifecycle, especially when dealing with sensitive data.

Discovered with💜 by Karina Gante.

LinkedIn GitHub gmail Instagram

Official Member of CVE-Hunters🏹

Related Content