CVE-2025-10072: Improper Access Controls in Portabilis i-Educar
A vulnerability was found in Portabilis i-Educar up to 2.10. This issue affects some unknown processing of the file /matricula/[ID_STUDENT]/enturmar/. Performing manipulation results in improper access controls. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-10072 is a medium-severity vulnerability affecting Portabilis i-Educar versions up to 2.10. The vulnerability arises from improper access controls in the processing of the URL path /matricula/[ID_STUDENT]/enturmar/. This endpoint appears to handle student enrollment or class assignment data. Due to insufficient validation or authorization checks, an attacker can remotely manipulate this endpoint to gain unauthorized access or perform unauthorized actions related to student enrollment data. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 vector indicates no privileges are required (PR:L means low privileges, but AT:N means no authentication needed), no user interaction, and partial impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. The vulnerability affects multiple versions from 2.0 through 2.10, indicating a long-standing issue in the product. The lack of patch links suggests that a fix may not yet be available or publicly disclosed. The vulnerability could allow attackers to access or modify sensitive student enrollment data, potentially leading to data breaches, unauthorized data manipulation, or disruption of educational administrative processes.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk to the confidentiality and integrity of student data. Unauthorized access to enrollment information could lead to privacy violations under GDPR, exposing institutions to regulatory penalties and reputational damage. Manipulation of enrollment data could disrupt academic records, affecting student progression and institutional operations. Since the vulnerability is remotely exploitable without authentication, attackers could leverage it to compromise multiple systems across networks, potentially leading to broader operational impacts. The medium severity indicates moderate risk, but the public availability of exploit code increases the urgency for mitigation. European educational bodies, especially those with digitalized student management systems, must consider this threat seriously to maintain compliance and operational continuity.
Mitigation Recommendations
Organizations should immediately audit their use of Portabilis i-Educar and identify affected versions in their environment. Until an official patch is released, implement network-level access controls to restrict access to the vulnerable endpoint, such as IP whitelisting or VPN requirements. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting /matricula/[ID_STUDENT]/enturmar/. Conduct thorough logging and monitoring of access to this endpoint to detect potential exploitation attempts. Educate IT staff about the vulnerability and the importance of rapid response. Once a patch is available, prioritize its deployment. Additionally, review and strengthen access control mechanisms within the application to ensure proper authorization checks are enforced on sensitive endpoints. Consider isolating the application in a segmented network zone to limit exposure. Regularly back up enrollment data to enable recovery in case of data manipulation.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom
CVE-2025-10072: Improper Access Controls in Portabilis i-Educar
Description
A vulnerability was found in Portabilis i-Educar up to 2.10. This issue affects some unknown processing of the file /matricula/[ID_STUDENT]/enturmar/. Performing manipulation results in improper access controls. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10072 is a medium-severity vulnerability affecting Portabilis i-Educar versions up to 2.10. The vulnerability arises from improper access controls in the processing of the URL path /matricula/[ID_STUDENT]/enturmar/. This endpoint appears to handle student enrollment or class assignment data. Due to insufficient validation or authorization checks, an attacker can remotely manipulate this endpoint to gain unauthorized access or perform unauthorized actions related to student enrollment data. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 vector indicates no privileges are required (PR:L means low privileges, but AT:N means no authentication needed), no user interaction, and partial impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. The vulnerability affects multiple versions from 2.0 through 2.10, indicating a long-standing issue in the product. The lack of patch links suggests that a fix may not yet be available or publicly disclosed. The vulnerability could allow attackers to access or modify sensitive student enrollment data, potentially leading to data breaches, unauthorized data manipulation, or disruption of educational administrative processes.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk to the confidentiality and integrity of student data. Unauthorized access to enrollment information could lead to privacy violations under GDPR, exposing institutions to regulatory penalties and reputational damage. Manipulation of enrollment data could disrupt academic records, affecting student progression and institutional operations. Since the vulnerability is remotely exploitable without authentication, attackers could leverage it to compromise multiple systems across networks, potentially leading to broader operational impacts. The medium severity indicates moderate risk, but the public availability of exploit code increases the urgency for mitigation. European educational bodies, especially those with digitalized student management systems, must consider this threat seriously to maintain compliance and operational continuity.
Mitigation Recommendations
Organizations should immediately audit their use of Portabilis i-Educar and identify affected versions in their environment. Until an official patch is released, implement network-level access controls to restrict access to the vulnerable endpoint, such as IP whitelisting or VPN requirements. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting /matricula/[ID_STUDENT]/enturmar/. Conduct thorough logging and monitoring of access to this endpoint to detect potential exploitation attempts. Educate IT staff about the vulnerability and the importance of rapid response. Once a patch is available, prioritize its deployment. Additionally, review and strengthen access control mechanisms within the application to ensure proper authorization checks are enforced on sensitive endpoints. Consider isolating the application in a segmented network zone to limit exposure. Regularly back up enrollment data to enable recovery in case of data manipulation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-07T11:45:30.000Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68be110862f0ad016f7a9926
Added to database: 9/7/2025, 11:11:04 PM
Last enriched: 9/15/2025, 12:42:33 AM
Last updated: 10/21/2025, 10:57:19 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62641: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox
HighCVE-2025-62592: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox
MediumCVE-2025-62591: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox
MediumCVE-2025-62590: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox
HighCVE-2025-62589: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.