Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Portabilis
Portabilis i-educar |
|
| CPEs | cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Portabilis
Portabilis i-educar |
Wed, 19 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/agenda_admin_cad.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_agenda GET parameter, which is directly concatenated into an SQL query without proper sanitization. This issue has been patched in commit 3e9763a. | |
| Title | i-Educar Authenticated Time-based SQL Injection in `agenda_admin_cad.php` | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-19T21:03:52.101Z
Reserved: 2025-11-13T15:36:51.681Z
Link: CVE-2025-65024
Updated: 2025-11-19T21:03:46.968Z
Status : Analyzed
Published: 2025-11-19T16:15:49.783
Modified: 2025-11-20T17:11:17.360
Link: CVE-2025-65024
No data.
OpenCVE Enrichment
No data.