Home

Description

i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/agenda.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_agenda request parameter, which is directly concatenated into multiple SQL queries without proper sanitization. This issue has been patched in commit b473f92.

PUBLISHED Reserved 2025-11-13 | Published 2025-11-19 | Updated 2025-11-19 | Assigner GitHub_M




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

<= 2.10.0
affected

References

github.com/...educar/security/advisories/GHSA-4hrj-5gwx-r4w4

github.com/...ommit/b473f92b5326f45d7bce2de93a5381bed7ca8ac7

cve.org (CVE-2025-65022)

nvd.nist.gov (CVE-2025-65022)

Download JSON