CVE-2025-9236

A vulnerability has been found in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /intranet/educar_tipo_usuario_lst.php of the component Tipos de usuàrio Page. Such manipulation of the argument nm_tipo/descrição leads to sql injection. The attack may be performed from a remote location. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*

History

04 Sep 2025, 18:34

Type Values Removed Values Added
CPE cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*
First Time Portabilis
Portabilis i-educar
References () https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9236.md - () https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9236.md - Exploit, Third Party Advisory
References () https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20nm_tipo%20Parameter%20on%20educar_tipo_usuario_lst.php%20Endpoint.md#poc - () https://github.com/marcelomulder/CVE/blob/main/i-educar/SQL%20Injection%20(Blind%20Time-Based)%20Vulnerability%20in%20nm_tipo%20Parameter%20on%20educar_tipo_usuario_lst.php%20Endpoint.md#poc - Broken Link
References () https://vuldb.com/?ctiid.320769 - () https://vuldb.com/?ctiid.320769 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.320769 - () https://vuldb.com/?id.320769 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.631370 - () https://vuldb.com/?submit.631370 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.638555 - () https://vuldb.com/?submit.638555 - Third Party Advisory, VDB Entry

29 Aug 2025, 11:15

Type Values Removed Values Added
References
  • () https://vuldb.com/?submit.638555 -
Summary (en) A vulnerability has been found in Portabilis i-Diario up to 2.10. This affects an unknown function of the file /intranet/educar_tipo_usuario_lst.php of the component Tipos de usàrio Page. Such manipulation of the argument nm_tipo leads to sql injection. The attack may be performed from a remote location. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability has been found in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /intranet/educar_tipo_usuario_lst.php of the component Tipos de usuàrio Page. Such manipulation of the argument nm_tipo/descrição leads to sql injection. The attack may be performed from a remote location. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

22 Aug 2025, 18:09

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad en Portabilis i-Diario (hasta la versión 2.10). Esta afecta a una función desconocida del archivo /intranet/educar_tipo_usuario_lst.php del componente Tipos de usàrio Page. Esta manipulación del argumento nm_tipo provoca una inyección SQL. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación sobre esta divulgación, pero no respondió.

20 Aug 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-20 18:15

Updated : 2025-09-04 18:34


NVD link : CVE-2025-9236

Mitre link : CVE-2025-9236

CVE.ORG link : CVE-2025-9236


JSON object : View

Products Affected

portabilis

  • i-educar
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')