Home

Description

i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/funcionario_vinculo_cad.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_funcionario_vinculo GET parameter, which is directly concatenated into an SQL query without proper sanitization. This issue has been patched in commit a00dfa3.

PUBLISHED Reserved 2025-11-13 | Published 2025-11-19 | Updated 2025-11-19 | Assigner GitHub_M




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

<= 2.10.0
affected

References

github.com/...educar/security/advisories/GHSA-8rv6-x8h9-fjfc exploit

github.com/...educar/security/advisories/GHSA-8rv6-x8h9-fjfc

github.com/...ommit/a00dfa3f129bc84e27873aa01cbd3f82e5b6c6c8

cve.org (CVE-2025-65023)

nvd.nist.gov (CVE-2025-65023)

Download JSON