A vulnerability was detected in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /intranet/agenda_preferencias.php. Performing manipulation of the argument cod_agenda results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9606.md | Exploit Issue Tracking |
| https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20cod_agenda%20Parameter%20on%20agenda_preferencias.php%20Endpoint.md#poc | Broken Link |
| https://vuldb.com/?ctiid.321784 | Permissions Required VDB Entry |
| https://vuldb.com/?id.321784 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.636577 | Third Party Advisory VDB Entry |
| https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9606.md | Exploit Issue Tracking |
| https://vuldb.com/?submit.636577 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-08-29 03:15
Updated : 2025-09-02 17:00
NVD link : CVE-2025-9606
Mitre link : CVE-2025-9606
CVE.ORG link : CVE-2025-9606
JSON object : View
Products Affected
portabilis
- i-educar
