CVE-2025-10013: Broken Access Control in /exportacao-para-o-seb
Endpoint
CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-10013
Summary
A Broken Access Control vulnerability was identified in the /exportacao-para-o-seb
endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.
Details
Vulnerable Endpoint: POST /exportacao-para-o-seb
Authentication: RequiredThe application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .
PoC
- Authenticate as a non-privileged user.
- Send the following request:
|
|
- We could observe that a file is attached to the response. This user shouldn't do this request.
Impact
Broken Access Control vulnerabilities can have severe consequences, including:
- Unauthorized access to restricted functionality;
- Escalation of privileges for low-level users;
- Exposure of sensitive data and potential system compromise;
- Loss of confidentiality and integrity of educational records;
- Reputational damage to the organization.
Reference
https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10013.md
Finder
By: CVE-Hunters