i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/agenda_admin_cad.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_agenda GET parameter, which is directly concatenated into an SQL query without proper sanitization. This issue has been patched in commit 3e9763a.
History

Mon, 24 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Portabilis
Portabilis i-educar
CPEs cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*
Vendors & Products Portabilis
Portabilis i-educar

Wed, 19 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Description i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/agenda_admin_cad.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_agenda GET parameter, which is directly concatenated into an SQL query without proper sanitization. This issue has been patched in commit 3e9763a.
Title i-Educar Authenticated Time-based SQL Injection in `agenda_admin_cad.php`
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-19T16:02:06.664Z

Updated: 2025-11-24T20:26:41.251Z

Reserved: 2025-11-13T15:36:51.681Z

Link: CVE-2025-65024

cve-icon Vulnrichment

Updated: 2025-11-19T21:03:46.968Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-19T16:15:49.783

Modified: 2025-11-20T17:11:17.360

Link: CVE-2025-65024

cve-icon Redhat

No data.