CVE-2025-9532

Exploring Boolean-Based SQL Injection in i-Educar with sqlmap and Database Extraction.

🇧🇷 Ler em Português.

During an audit in the i-Educar, I identified a serious Boolean-Based SQL Injection flaw in the id parameter of the /module/RegraAvaliacao/view endpoint.
With the help of the tool sqlmap, it was possible to exploit the flaw and extract information directly from the database.
This vulnerability has been confirmed and officially registered as CVE-2025-9532.

CVE-2025-9532 describes a SQL Injection flaw in the /module/RegraAvaliacao/view?id=[id] endpoint, where the id parameter is not properly validated.
Using Boolean techniques, it was possible to infer the database structure, access confidential data, and explore the backend without generating errors visible to the user.

Vulnerable Endpoint /module/RegraAvaliacao/view?id=

Affected Parameter: id

To demonstrate the vulnerability, the following command was used:

sqlmap -u "http://localhost:8086/module/RegraAvaliacao/view?id=1" -p id --cookie="i_educar_session=qEk2wbjxS5IbECJGqnIa0dbmIyI3XIsXqm3WSh6K" \ --dbms=PostgreSQL --technique=B --dbs --batch

The sqlmap will automatically test the id parameter, and after a few minutes it will begin revealing the available databases—confirming the injection.


With the injection confirmed, it was also possible to list tables and columns with additional sqlmap commands, highlighting the potential for data exfiltration:


Report

You can access the full report and see the complete step-by-step instructions. Here:

CVE-2025-9532 Report

This vulnerability can be exploited to:

  • Access sensitive data stored in the database;
  • Enumerate database schemas, tables, and columns;
  • Modify, delete, or insert arbitrary records;
  • Steal user credentials and personal information;
  • Perform a denial of service (DoS) attack by triggering long query delays;
  • In some cases, escalate to Remote Code Execution (RCE).

The flaw was ethically reported and attributed as:

Boolean-based attacks are discreet, efficient, and often go undetected by superficial logs. This discovery reinforces the importance of properly validating input parameters, especially numeric IDs that are often considered "safe".

The exposure of sensitive data through SQLi remains one of the biggest threats in the web application landscape, and this flaw in i-Educar serves as a practical warning about this.

Discovered with 💜 by Karina Gante.

LinkedIn GitHub gmail Instagram

Official Member of CVE-Hunters🏹

Related Content