Skip to main content

CVE-2025-10844: SQL Injection in Portabilis i-Educar

Medium
VulnerabilityCVE-2025-10844cvecve-2025-10844
Published: Tue Sep 23 2025 (09/23/2025, 06:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Educar

Description

A vulnerability has been found in Portabilis i-Educar up to 2.10. Affected by this issue is some unknown functionality of the file /module/Cadastro/aluno. The manipulation of the argument is leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/24/2025, 00:12:31 UTC

Technical Analysis

CVE-2025-10844 is a SQL Injection vulnerability identified in the Portabilis i-Educar platform, affecting versions 2.0 through 2.10. The vulnerability resides in an unspecified functionality within the /module/Cadastro/aluno file, where improper handling of an input argument allows an attacker to inject malicious SQL commands. This flaw enables remote exploitation without requiring user interaction or prior authentication, as indicated by the CVSS vector. The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt service availability. The CVSS 4.0 score of 5.3 classifies this as a medium severity issue, reflecting moderate impact and relatively low complexity of exploitation. Although no public exploits are currently known to be actively used in the wild, the disclosure of the vulnerability and its exploit details increases the risk of future attacks. Given that i-Educar is an educational management system, the vulnerability could expose sensitive student and institutional data, posing privacy and operational risks.

Potential Impact

For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability could lead to unauthorized access to personal data of students, staff, and faculty, violating GDPR and other data protection regulations. The integrity of academic records and administrative data could be compromised, potentially affecting enrollment, grading, and reporting processes. Availability disruptions could hinder educational operations, causing reputational damage and operational delays. The medium severity rating suggests that while the risk is not critical, exploitation could still result in significant data breaches or service interruptions. European entities must consider the legal and compliance ramifications of such data exposure, as well as the potential for targeted attacks leveraging this vulnerability to gain footholds within educational networks.

Mitigation Recommendations

Organizations should prioritize updating Portabilis i-Educar to a patched version once available from the vendor, as no patch links are currently provided. In the interim, applying web application firewalls (WAFs) with rules designed to detect and block SQL injection attempts targeting the /module/Cadastro/aluno endpoint can reduce exposure. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters related to student registration modules. Employ database access controls to limit the privileges of the application user, minimizing the impact of any successful injection. Regularly audit logs for suspicious SQL queries or anomalies. Additionally, implement network segmentation to isolate the educational management system from critical infrastructure and sensitive data stores. Educate IT staff on monitoring for exploitation attempts and prepare incident response plans specific to web application attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-22T05:35:18.925Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d336ad712f26b964ce8e99

Added to database: 9/24/2025, 12:09:17 AM

Last enriched: 9/24/2025, 12:12:31 AM

Last updated: 9/30/2025, 12:09:09 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats