CVE-2025-10011
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-05

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /module/TabelaArredondamento/edit. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-05
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-09-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
portabilis i-educar to 2.10.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-10011 is a Blind Time-Based SQL Injection vulnerability in Portabilis i-Educar up to version 2.10, specifically affecting the 'id' parameter of the /module/TabelaArredondamento/edit endpoint. The application fails to properly validate and sanitize this parameter, allowing attackers to inject arbitrary SQL commands into the backend database. This can be exploited remotely and may lead to unauthorized data access, data manipulation, denial of service through time delays, and potentially remote code execution when combined with other vulnerabilities. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to access confidential data without authorization, modify or delete data, disrupt service availability through time-based delays, and potentially execute remote code if combined with other vulnerabilities. It compromises the confidentiality, integrity, and availability of the affected system. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending specially crafted requests to the `/module/TabelaArredondamento/edit` endpoint, specifically manipulating the `id` parameter with time-based SQL injection payloads. For example, a proof-of-concept payload uses PostgreSQL's PG_SLEEP function to cause a delay in the server response, confirming the vulnerability. A sample payload is: '+AND+7097=(SELECT+7097+FROM+PG_SLEEP(5))+AND+'WqeR'='WqeR'. You can test this by sending a POST request with this payload in the `id` parameter and observing if the response is delayed by approximately 5 seconds, indicating the presence of the blind time-based SQL injection. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable endpoint `/module/TabelaArredondamento/edit` to trusted users only, especially since exploitation requires permissions related to the 'Escola' menu. If possible, disable or restrict the affected functionality until a patch or update is available. Since no known countermeasures or mitigations have been documented, consider replacing the affected component with an alternative product or applying input validation and sanitization on the `id` parameter to prevent SQL injection. Monitoring and blocking suspicious requests targeting this endpoint can also help reduce risk. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart