Vulnerability Description
i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/agenda.php script. An attacker with access to an authenticated session can execute arbitrary SQL commands against the application's database. This vulnerability is caused by the improper handling of the cod_agenda request parameter, which is directly concatenated into multiple SQL queries without proper sanitization. This issue has been patched in commit b473f92.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Portabilis | I-Educar | <= 2.10.0 |
Related Weaknesses (CWE)
References
- https://github.com/portabilis/i-educar/commit/b473f92b5326f45d7bce2de93a5381bed7Patch
- https://github.com/portabilis/i-educar/security/advisories/GHSA-4hrj-5gwx-r4w4Third Party Advisory
FAQ
What is CVE-2025-65022?
CVE-2025-65022 is a vulnerability with a CVSS score of 7.2 (HIGH). i-Educar is free, fully online school management software. In versions 2.10.0 and prior, an authenticated time-based SQL injection vulnerability exists in the ieducar/intranet/agenda.php script. An at...
How severe is CVE-2025-65022?
CVE-2025-65022 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65022?
Check the references section above for vendor advisories and patch information. Affected products include: Portabilis I-Educar.