CVE-2025-11554

6.3 MEDIUM

📋 TL;DR

This vulnerability in Portabilis i-Educar allows attackers to escalate privileges through insecure inherited permissions in the User Type Handler component. Attackers can remotely exploit this to gain unauthorized access to sensitive functions. All users running i-Educar up to version 2.9.10 are affected.

💻 Affected Systems

Products:
  • Portabilis i-Educar
Versions: Up to and including 2.9.10
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configurations are vulnerable. The vulnerability exists in the AccessLevelController.php file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative privileges, allowing complete system compromise, data theft, and further lateral movement within the network.

🟠

Likely Case

Unauthorized users gain elevated permissions to access sensitive student/teacher data, modify grades, or alter system configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to attempted privilege escalation that can be detected and blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires authenticated access but can be combined with other vulnerabilities. Public exploit code is available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.11 or later

Vendor Advisory: https://github.com/portabilis/i-educar

Restart Required: No

Instructions:

1. Backup your current installation. 2. Update to i-Educar version 2.9.11 or later. 3. Verify the AccessLevelController.php file has been updated. 4. Test user permission inheritance functionality.

🔧 Temporary Workarounds

Restrict Access to AccessLevelController

all

Temporarily restrict direct access to the vulnerable controller file

chmod 600 app/Http/Controllers/AccessLevelController.php
Add IP-based restrictions in web server configuration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate i-Educar instances
  • Enable detailed logging and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if app/Http/Controllers/AccessLevelController.php exists and compare hash with known vulnerable versions

Check Version:

php artisan --version or check composer.json

Verify Fix Applied:

Verify version is 2.9.11+ and test user permission inheritance with non-admin accounts

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed permission inheritance requests
  • Unusual user permission changes
  • Access to AccessLevelController from unexpected IPs

Network Indicators:

  • HTTP POST requests to AccessLevelController endpoints
  • Unusual authentication patterns

SIEM Query:

source="i-educar-logs" AND (event="permission_change" OR controller="AccessLevelController")

🔗 References

📤 Share & Export