Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Nov 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Portabilis
Portabilis i-educar |
|
| CPEs | cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Portabilis
Portabilis i-educar |
Wed, 19 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/funcionario_vinculo_cad.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_funcionario_vinculo GET parameter, which is directly concatenated into an SQL query without proper sanitization. This issue has been patched in commit a00dfa3. | |
| Title | i-Educar Authenticated Time-based SQL Injection in `funcionario_vinculo_cad.php` | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-19T18:51:24.399Z
Reserved: 2025-11-13T15:36:51.681Z
Link: CVE-2025-65023
Updated: 2025-11-19T18:51:15.583Z
Status : Analyzed
Published: 2025-11-19T16:15:49.603
Modified: 2025-11-20T17:20:18.957
Link: CVE-2025-65023
No data.
OpenCVE Enrichment
No data.