Home

Description

i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/agenda_admin_cad.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_agenda GET parameter, which is directly concatenated into an SQL query without proper sanitization. This issue has been patched in commit 3e9763a.

PUBLISHED Reserved 2025-11-13 | Published 2025-11-19 | Updated 2025-11-24 | Assigner GitHub_M




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

<= 2.10.0
affected

References

github.com/...educar/security/advisories/GHSA-6c8p-xqcv-rghx

github.com/...ommit/3e9763a561b328edaed21a7dc2e0dba0bbbc6e22

cve.org (CVE-2025-65024)

nvd.nist.gov (CVE-2025-65024)

Download JSON