CVE-2025-9652

How I Discovered Multiple Stored XSS in i-Educar via educar_transferencia_tipo_cad.php (With PoC and Screenshots).

🇧🇷 Ler em Português.

While analyzing the company registration functionality in the i-Educar system, I found multiple stored XSS vulnerabilities in the /intranet/educar_transferencia_tipo_cad.php endpoint. Both the nm_tipo and desc_tipo fields accepted malicious scripts without any input sanitization.
As a result, the payload was saved on the server and executed automatically when accessing the company listing page. This vulnerability was officially assigned as CVE-2025-9652.
In this post, I’ll walk you through the technical details, PoC steps, and security risks posed by this issue.

CVE-2025-9652 refers two stored Cross-Site Scripting (XSS) vulnerabilities in the /intranet/educar_transferencia_tipo_cad.php endpoint of the i-Educar application.
The nm_tipo and desc_tipo parameters fail to properly sanitize user input, allowing malicious scripts to be stored and automatically executed when the /intranet/educar_transferencia_tipo_lst.php page is accessed.

Vulnerable Endpoint /intranet/educar_transferencia_tipo_cad.php

Affected Parameters: nm_tipo and desc_tipo

Trigger Page: /intranet/educar_transferencia_tipo_lst.php

Other Affected Endpoint: /intranet/educar_transferencia_tipo_det.php?cod_transferencia_tipo=[id]

Payload Used

"><img src=x onerror=alert('CVE-Hunters')>

To reproduce this vulnerability, follow the steps below:

1. Access vulnerable endpoint.
2. Select default option on first field.
3. Insert the payload in second field ("Motivo Transferência") and third field ("Descrição").
4. Click on "Salvar".

The /intranet/educar_transferencia_tipo_lst.php page will load automatically, triggering the stored XSS:

Parameter nm_tipoParameter desc_tipo
Report

You can access the full technical report with all PoC steps here:

CVE-2025-9652 Report

This Cross-Site Scripting (XSS) vulnerability can be exploited to:

  • Steal session cookies (session hijacking);
  • Install malware on victims’ devices;
  • Steal credentials stored in the browser;
  • Redirect users to malicious websites;
  • Deface the application interface;
  • Damage the institutional reputation.

The issue was ethically reported and officially registered as:

CVE-2025-9652 shows that even seemingly harmless fields like company names can become vectors for stored XSS attacks. When displayed in administrative panels without proper validation or output encoding, they pose a real threat.
Ensuring input validation on every form — no matter how trivial the field — is important to keeping web applications secure.

Discovered with💜 by Karina Gante.

LinkedIn GitHub gmail Instagram

Official Member of CVE-Hunters🏹

Related Content