{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9760","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-31T12:48:58.863Z","datePublished":"2025-09-01T04:02:06.278Z","dateUpdated":"2025-09-17T15:24:36.439Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-17T15:24:36.439Z"},"title":"Portabilis i-Educar Matricula API matricula improper authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"Portabilis","product":"i-Educar","versions":[{"version":"2.0","status":"affected"},{"version":"2.1","status":"affected"},{"version":"2.2","status":"affected"},{"version":"2.3","status":"affected"},{"version":"2.4","status":"affected"},{"version":"2.5","status":"affected"},{"version":"2.6","status":"affected"},{"version":"2.7","status":"affected"},{"version":"2.8","status":"affected"},{"version":"2.9","status":"affected"},{"version":"2.10","status":"affected"}],"modules":["Matricula API"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Portabilis i-Educar up to 2.10. This affects an unknown part of the file /module/Api/matricula of the component Matricula API. Executing manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited."},{"lang":"de","value":"Es wurde eine Schwachstelle in Portabilis i-Educar up to 2.10 entdeckt. Davon betroffen ist unbekannter Code der Datei /module/Api/matricula der Komponente Matricula API. Mittels dem Manipulieren mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-09-05T17:12:30.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"marceloQz (VulDB User)","type":"reporter"},{"lang":"en","value":"marceloQz (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.322061","name":"VDB-322061 | Portabilis i-Educar Matricula API matricula improper authorization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.322061","name":"VDB-322061 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.640690","name":"Submit #640690 | Portabilis i-educar 2.10 Broken Function Level Authorization","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.643575","name":"Submit #643575 | Portabilis i-educar 2.10 Broken Object Level Authorization (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.648827","name":"Submit #648827 | Portabilis i-educar 2.10 Broken Object Level Authorization (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9760.md","tags":["related"]},{"url":"https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Function%20Level%20Authorization%20on%20%60matricula%60%20API%20allows%20deletion%20of%20%E2%80%9Cabandono%E2%80%9D%20status.md#proof-of-concept-poc","tags":["broken-link","exploit"]}]},"adp":[{"references":[{"url":"https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-9760.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-02T14:32:16.733630Z","id":"CVE-2025-9760","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-02T15:11:25.338Z"}}]}}