CVE-2025-10071

6.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to bypass access controls in Portabilis i-Educar's batch enrollment cancellation endpoint. Remote attackers can manipulate the /cancelar-enturmacao-em-lote/ endpoint to perform unauthorized actions. All users of i-Educar up to version 2.10 are affected.

💻 Affected Systems

Products:
  • Portabilis i-Educar
Versions: Up to and including 2.10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable endpoint accessible are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could cancel batch enrollments without authorization, potentially disrupting educational operations and student data integrity.

🟠

Likely Case

Unauthorized users could cancel student enrollments they shouldn't have access to, causing administrative disruption.

🟢

If Mitigated

With proper access controls, only authorized administrators could perform batch enrollment cancellations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly available in GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.10

Vendor Advisory: https://github.com/portabilis/i-educar

Restart Required: No

Instructions:

1. Update i-Educar to version after 2.10. 2. Verify the patch is applied by checking version. 3. Test the /cancelar-enturmacao-em-lote/ endpoint functionality.

🔧 Temporary Workarounds

Endpoint Restriction

all

Restrict access to the vulnerable endpoint using web server configuration or firewall rules.

# Apache: <Location /cancelar-enturmacao-em-lote/> Require valid-user </Location>
# Nginx: location /cancelar-enturmacao-em-lote/ { deny all; }

🧯 If You Can't Patch

  • Implement strict access controls and authentication for the endpoint.
  • Monitor and log all access attempts to the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if i-Educar version is 2.10 or earlier and the /cancelar-enturmacao-em-lote/ endpoint is accessible.

Check Version:

Check i-Educar configuration files or admin panel for version information.

Verify Fix Applied:

Verify i-Educar version is after 2.10 and test endpoint access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /cancelar-enturmacao-em-lote/
  • Multiple enrollment cancellation requests from single user

Network Indicators:

  • HTTP requests to /cancelar-enturmacao-em-lote/ without proper authentication

SIEM Query:

source="web_server" AND uri="/cancelar-enturmacao-em-lote/" AND (user="anonymous" OR auth_status="failed")

🔗 References

📤 Share & Export