CVE-2025-65024

i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/agenda_admin_cad.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_agenda GET parameter, which is directly concatenated into an SQL query without proper sanitization. This issue has been patched in commit 3e9763a.
Configurations

Configuration 1 (hide)

cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*

History

20 Nov 2025, 17:11

Type Values Removed Values Added
First Time Portabilis i-educar
Portabilis
CPE cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*
References () https://github.com/portabilis/i-educar/commit/3e9763a561b328edaed21a7dc2e0dba0bbbc6e22 - () https://github.com/portabilis/i-educar/commit/3e9763a561b328edaed21a7dc2e0dba0bbbc6e22 - Patch
References () https://github.com/portabilis/i-educar/security/advisories/GHSA-6c8p-xqcv-rghx - () https://github.com/portabilis/i-educar/security/advisories/GHSA-6c8p-xqcv-rghx - Exploit, Vendor Advisory

19 Nov 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-19 16:15

Updated : 2025-11-20 17:11


NVD link : CVE-2025-65024

Mitre link : CVE-2025-65024

CVE.ORG link : CVE-2025-65024


JSON object : View

Products Affected

portabilis

  • i-educar
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')