Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10072: Improper Access Controls in Portabilis i-Educar

0
Medium
VulnerabilityCVE-2025-10072cvecve-2025-10072
Published: Sun Sep 07 2025 (09/07/2025, 23:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability was found in Portabilis i-Educar up to 2.10. This issue affects some unknown processing of the file /matricula/[ID_STUDENT]/enturmar/. Performing manipulation results in improper access controls. It is possible to initiate the attack remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/15/2025, 00:42:33 UTC

Technical Analysis

CVE-2025-10072 is a medium-severity vulnerability affecting Portabilis i-Educar versions up to 2.10. The vulnerability arises from improper access controls in the processing of the URL path /matricula/[ID_STUDENT]/enturmar/. This endpoint appears to handle student enrollment or class assignment data. Due to insufficient validation or authorization checks, an attacker can remotely manipulate this endpoint to gain unauthorized access or perform unauthorized actions related to student enrollment data. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 vector indicates no privileges are required (PR:L means low privileges, but AT:N means no authentication needed), no user interaction, and partial impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. The vulnerability affects multiple versions from 2.0 through 2.10, indicating a long-standing issue in the product. The lack of patch links suggests that a fix may not yet be available or publicly disclosed. The vulnerability could allow attackers to access or modify sensitive student enrollment data, potentially leading to data breaches, unauthorized data manipulation, or disruption of educational administrative processes.

Potential Impact

For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk to the confidentiality and integrity of student data. Unauthorized access to enrollment information could lead to privacy violations under GDPR, exposing institutions to regulatory penalties and reputational damage. Manipulation of enrollment data could disrupt academic records, affecting student progression and institutional operations. Since the vulnerability is remotely exploitable without authentication, attackers could leverage it to compromise multiple systems across networks, potentially leading to broader operational impacts. The medium severity indicates moderate risk, but the public availability of exploit code increases the urgency for mitigation. European educational bodies, especially those with digitalized student management systems, must consider this threat seriously to maintain compliance and operational continuity.

Mitigation Recommendations

Organizations should immediately audit their use of Portabilis i-Educar and identify affected versions in their environment. Until an official patch is released, implement network-level access controls to restrict access to the vulnerable endpoint, such as IP whitelisting or VPN requirements. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting /matricula/[ID_STUDENT]/enturmar/. Conduct thorough logging and monitoring of access to this endpoint to detect potential exploitation attempts. Educate IT staff about the vulnerability and the importance of rapid response. Once a patch is available, prioritize its deployment. Additionally, review and strengthen access control mechanisms within the application to ensure proper authorization checks are enforced on sensitive endpoints. Consider isolating the application in a segmented network zone to limit exposure. Regularly back up enrollment data to enable recovery in case of data manipulation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-07T11:45:30.000Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68be110862f0ad016f7a9926

Added to database: 9/7/2025, 11:11:04 PM

Last enriched: 9/15/2025, 12:42:33 AM

Last updated: 10/21/2025, 10:57:19 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-62641: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

CVE-2025-62592: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox

Medium
VulnerabilityTue Oct 21 2025

CVE-2025-62591: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox

Medium
VulnerabilityTue Oct 21 2025

CVE-2025-62590: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

CVE-2025-62589: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats