CVE-2025-10846: SQL Injection in Portabilis i-Educar
A vulnerability was determined in Portabilis i-Educar up to 2.10. This vulnerability affects unknown code of the file /module/ComponenteCurricular/edit. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-10846 is a SQL injection vulnerability identified in the Portabilis i-Educar platform, a widely used educational management system. The vulnerability resides in the /module/ComponenteCurricular/edit endpoint, where the ID parameter is improperly sanitized, allowing attackers to inject arbitrary SQL commands. This flaw can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The vulnerability affects all versions up to 2.10, indicating a broad attack surface. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects that the attack is network-based, requires low attack complexity, no privileges, and no user interaction, but partial impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit code raises the likelihood of future attacks. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt service availability by executing malicious SQL statements against the backend database. Given the critical role of i-Educar in managing educational data, exploitation could lead to significant data breaches and operational impacts.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk of unauthorized data access, data manipulation, and potential service disruption. Confidential student and staff information could be exposed or altered, undermining data privacy compliance obligations such as GDPR. Integrity of academic records and curricular data could be compromised, affecting institutional trust and operational continuity. Availability impacts could disrupt educational services, causing administrative delays and reputational damage. The remote, unauthenticated nature of the exploit increases the threat level, as attackers can target vulnerable systems over the internet without prior access. The medium CVSS score reflects moderate but tangible risk, especially in environments lacking compensating controls. European entities with limited cybersecurity resources or delayed patch management may face elevated exposure. Additionally, the public disclosure of exploit details may accelerate attack attempts, increasing urgency for mitigation.
Mitigation Recommendations
Organizations should immediately inventory their deployments of Portabilis i-Educar to identify affected versions (2.0 through 2.10). They should monitor vendor communications for official patches or updates addressing CVE-2025-10846 and apply them promptly upon release. In the absence of patches, implement strict input validation and sanitization on the ID parameter at the application or web server level to block malicious SQL payloads. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns to provide a protective barrier. Conduct thorough code reviews and penetration testing focused on injection vectors within the affected module. Restrict network access to the i-Educar management interfaces to trusted IP ranges and enforce strong authentication and authorization controls to reduce exposure. Maintain comprehensive logging and monitoring to detect suspicious query patterns or anomalous database activity. Educate IT staff and administrators about the vulnerability and response procedures. Finally, prepare incident response plans to quickly contain and remediate any exploitation attempts.
Affected Countries
Portugal, Spain, Italy, France, Germany
CVE-2025-10846: SQL Injection in Portabilis i-Educar
Description
A vulnerability was determined in Portabilis i-Educar up to 2.10. This vulnerability affects unknown code of the file /module/ComponenteCurricular/edit. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-10846 is a SQL injection vulnerability identified in the Portabilis i-Educar platform, a widely used educational management system. The vulnerability resides in the /module/ComponenteCurricular/edit endpoint, where the ID parameter is improperly sanitized, allowing attackers to inject arbitrary SQL commands. This flaw can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The vulnerability affects all versions up to 2.10, indicating a broad attack surface. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects that the attack is network-based, requires low attack complexity, no privileges, and no user interaction, but partial impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit code raises the likelihood of future attacks. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt service availability by executing malicious SQL statements against the backend database. Given the critical role of i-Educar in managing educational data, exploitation could lead to significant data breaches and operational impacts.
Potential Impact
For European organizations, particularly educational institutions using Portabilis i-Educar, this vulnerability poses a risk of unauthorized data access, data manipulation, and potential service disruption. Confidential student and staff information could be exposed or altered, undermining data privacy compliance obligations such as GDPR. Integrity of academic records and curricular data could be compromised, affecting institutional trust and operational continuity. Availability impacts could disrupt educational services, causing administrative delays and reputational damage. The remote, unauthenticated nature of the exploit increases the threat level, as attackers can target vulnerable systems over the internet without prior access. The medium CVSS score reflects moderate but tangible risk, especially in environments lacking compensating controls. European entities with limited cybersecurity resources or delayed patch management may face elevated exposure. Additionally, the public disclosure of exploit details may accelerate attack attempts, increasing urgency for mitigation.
Mitigation Recommendations
Organizations should immediately inventory their deployments of Portabilis i-Educar to identify affected versions (2.0 through 2.10). They should monitor vendor communications for official patches or updates addressing CVE-2025-10846 and apply them promptly upon release. In the absence of patches, implement strict input validation and sanitization on the ID parameter at the application or web server level to block malicious SQL payloads. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns to provide a protective barrier. Conduct thorough code reviews and penetration testing focused on injection vectors within the affected module. Restrict network access to the i-Educar management interfaces to trusted IP ranges and enforce strong authentication and authorization controls to reduce exposure. Maintain comprehensive logging and monitoring to detect suspicious query patterns or anomalous database activity. Educate IT staff and administrators about the vulnerability and response procedures. Finally, prepare incident response plans to quickly contain and remediate any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-22T05:35:24.202Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d247e7cc150725e5c5bdc6
Added to database: 9/23/2025, 7:10:31 AM
Last enriched: 10/28/2025, 3:51:07 AM
Last updated: 11/7/2025, 2:57:14 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11546: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NEC Corporation CLUSTERPRO X for Linux (EXPRESSCLUSTER X for Linux)
CriticalCVE-2024-9683: Authentication Bypass by Primary Weakness
MediumCVE-2025-52662: Vulnerability in Vercel Nuxt Devtools
MediumCVE-2025-48985: Vulnerability in Vercel AI SDK
LowCVE-2025-12789: URL Redirection to Untrusted Site ('Open Redirect') in Red Hat Red Hat Single Sign-On 7
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.