Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10607: Information Disclosure in Portabilis i-Educar

0
Medium
VulnerabilityCVE-2025-10607cvecve-2025-10607
Published: Wed Sep 17 2025 (09/17/2025, 18:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A security vulnerability has been detected in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/Avaliacao/diarioApi. Such manipulation leads to information disclosure. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 09/17/2025, 18:13:12 UTC

Technical Analysis

CVE-2025-10607 is a medium-severity information disclosure vulnerability affecting Portabilis i-Educar versions up to 2.10. The vulnerability resides in an unspecified function within the /module/Avaliacao/diarioApi file. This flaw allows an unauthenticated remote attacker to manipulate the vulnerable function to disclose sensitive information. The CVSS 4.0 vector indicates that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges, but the description states no authentication needed, so this may be a minor discrepancy), and no user interaction (UI:N). The vulnerability impacts confidentiality (VC:L) but not integrity or availability. The scope is unchanged, meaning the vulnerability affects only the vulnerable component. Although no known exploits are currently observed in the wild, a public exploit has been disclosed, increasing the risk of exploitation. The vulnerability likely exposes sensitive data stored or processed by the i-Educar platform, which is an educational management system used primarily in Brazil but may have deployments elsewhere. The lack of detailed technical information about the exact nature of the information disclosed limits precise impact assessment, but information disclosure vulnerabilities can lead to leakage of personally identifiable information (PII), student records, or system configuration details that could facilitate further attacks.

Potential Impact

For European organizations, the impact depends on the adoption of Portabilis i-Educar within educational institutions or related entities. If deployed, the vulnerability could lead to unauthorized disclosure of sensitive student or staff data, violating GDPR and other data protection regulations, potentially resulting in legal penalties and reputational damage. The exposure of internal system information could also aid attackers in crafting more targeted attacks, increasing the risk of subsequent compromise. The medium severity rating suggests a moderate risk, but the presence of a public exploit increases urgency. Educational institutions are often targeted due to the sensitive nature of their data and sometimes weaker cybersecurity postures. Therefore, European schools or educational bodies using i-Educar could face confidentiality breaches, undermining trust and compliance with data protection laws.

Mitigation Recommendations

Given the absence of an official patch link, organizations should immediately assess their use of i-Educar and the affected versions (2.0 through 2.10). Mitigation steps include: 1) Restricting external access to the /module/Avaliacao/diarioApi endpoint via network controls such as firewalls or web application firewalls (WAFs) to limit exposure to trusted internal networks only. 2) Implementing strict access controls and monitoring on the vulnerable module to detect unusual access patterns. 3) Applying virtual patching techniques using WAF rules to block known exploit patterns once exploit details are analyzed. 4) Engaging with Portabilis for official patches or updates and planning prompt upgrade once available. 5) Conducting thorough audits of logs and data access to identify any potential exploitation attempts. 6) Educating IT staff and users about the vulnerability and encouraging vigilance for suspicious activity. These targeted mitigations go beyond generic advice by focusing on network-level restrictions and proactive monitoring tailored to the specific vulnerable component.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-17T07:04:46.682Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68caf94c33b75e972181a555

Added to database: 9/17/2025, 6:09:16 PM

Last enriched: 9/17/2025, 6:13:12 PM

Last updated: 11/1/2025, 7:11:31 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats