Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10608: Improper Access Controls in Portabilis i-Educar

0
Medium
VulnerabilityCVE-2025-10608cvecve-2025-10608
Published: Wed Sep 17 2025 (09/17/2025, 18:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability was detected in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /enrollment-history/. Performing manipulation results in improper access controls. The attack is possible to be carried out remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/25/2025, 00:39:14 UTC

Technical Analysis

CVE-2025-10608 is a medium-severity vulnerability affecting Portabilis i-Educar versions up to 2.10. The vulnerability arises from improper access controls in an unspecified function within the /enrollment-history/ endpoint or file. This flaw allows an attacker to remotely manipulate the system without requiring user interaction or elevated privileges beyond low-level privileges (PR:L). The vulnerability impacts confidentiality, integrity, and availability at a low level, indicating that unauthorized access or modification of enrollment history data is possible but likely limited in scope or impact. The CVSS 4.0 vector AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P indicates network attack vector, low attack complexity, no authentication required beyond low privileges, no user interaction, and partial impacts on confidentiality, integrity, and availability. The exploit code is publicly available, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The vulnerability affects multiple versions from 2.0 through 2.10, suggesting a long-standing issue that may be present in many deployments. The lack of patch links suggests that a fix may not yet be publicly available or is in progress. The vulnerability is particularly relevant to educational institutions or organizations using the i-Educar platform for managing enrollment and student data, where unauthorized access could lead to data leakage or manipulation of enrollment records.

Potential Impact

For European organizations, especially educational institutions using Portabilis i-Educar, this vulnerability could lead to unauthorized access to sensitive student enrollment data, potentially violating data protection regulations such as GDPR. The improper access controls could allow attackers to view or alter enrollment histories, leading to data integrity issues and undermining trust in educational records. Although the impact is rated medium, the presence of publicly available exploit code increases the risk of exploitation, which could result in reputational damage, regulatory penalties, and operational disruptions. The remote attack vector means that attackers do not need physical access or user interaction, increasing the threat surface. Organizations relying on i-Educar for critical administrative functions may face challenges in maintaining data confidentiality and integrity until the vulnerability is remediated.

Mitigation Recommendations

European organizations should immediately conduct an inventory to identify deployments of Portabilis i-Educar versions 2.0 through 2.10. Until a patch is available, implement network-level access controls to restrict access to the /enrollment-history/ endpoint, limiting it to trusted internal IP addresses or VPN users. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this endpoint. Monitor logs for unusual access patterns or attempts to exploit the vulnerability. Engage with Portabilis to obtain or expedite patches and apply them promptly once released. Additionally, conduct a thorough review of user privileges to ensure that only necessary personnel have access rights that could be leveraged in exploitation. Implement multi-factor authentication (MFA) for administrative access to reduce the risk of privilege escalation. Finally, prepare incident response plans specific to potential exploitation scenarios involving enrollment data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-17T07:04:49.482Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68caff33b5624fa867f4a632

Added to database: 9/17/2025, 6:34:27 PM

Last enriched: 9/25/2025, 12:39:14 AM

Last updated: 12/14/2025, 8:16:50 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats