CVE-2025-10845

How I Found a Time-Based Blind SQL Injection in i-Educar (With Real Delay and PoC).
🇧🇷 Ler em Português.
CVE-2025-10845
Introduction
While diving into the i-Educar Open-Source project, I uncovered a critical time-based blind SQL Injection vulnerability in the id parameter of the /module/ComponenteCurricular/view endpoint.This flaw allows attackers to execute arbitrary SQL queries silently against the backend database, putting data confidentiality, integrity, and availability at risk.After validating the issue using a payload that caused measurable delays in the server's response, I reported it responsibly, and it was officially assigned as CVE-2025-10845.
What is CVE-2025-10845?
CVE-2025-10845 is a SQL Injection vulnerability in the /module/ComponenteCurricular/view endpoint of the i-Educar application.The vulnerable parameter is id, which lacks proper input validation.This makes it possible to inject custom SQL queries, including PG_SLEEP()
functions that introduce time delays, confirming the flaw via time-based behavior.
Technical Details
➤ Vulnerable Endpoint /module/ComponenteCurricular/view
➤ Affected Parameter: id
➤ Payload Used (Encoded)
%27%20AND%206606=(SELECT%206606%20FROM%20PG_SLEEP(5))%20AND%20%27QDaZ%27=%27QDaZ
➤ Payload Used (Decoded)
' AND 6606=(SELECT 6606 FROM PG_SLEEP(5)) AND 'QDaZ'='QDaZ
Proof of Concept (PoC)
To reproduce the vulnerability:
➤ Access the endpoint /intranet/educar_componente_curricular_lst.php
and choose an id.
➤ In the vulnerable endpoint, the payload must be inserted after id
number (e.g. “id=8payload”).
The server will take 5 seconds to respond, confirming that the SQL query was executed successfully.
You can access the full report and see the complete step-by-step instructions. Here:
Impact
This vulnerability can be exploited to:
- Access sensitive data stored in the database;
- Enumerate database schemas, tables, and columns;
- Modify, delete, or insert arbitrary records;
- Steal user credentials and personal information;
- Perform a denial of service (DoS) attack by triggering long query delays;
- In some cases, escalate to Remote Code Execution (RCE).
Official Sources
The flaw was ethically reported and attributed as:
Conclusion
SQL injection attacks remain one of the most critical threats to web applications, especially when silent and time-based. This discovery demonstrates how a single unvalidated parameter can compromise the entire database behind a platform.If you're a developer or security analyst, be aware: even small, seemingly harmless endpoints can hide dangerous flaws.
Credits
Discovered with 💜 by Karina Gante.
Official Member of CVE-Hunters🏹
Related Content

If you find this post helpful, please consider sharing 💜