CVE-2025-10071: Broken Access Control in /cancelar-enturmacao-em-lote/[ID]
Endpoint
CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-10071
Summary
A Broken Access Control vulnerability was identified in the /cancelar-enturmacao-em-lote/[ID]
endpoint of the i-educar application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks.
Details
Vulnerable Endpoint: GET /cancelar-enturmacao-em-lote/[ID]
Authentication: RequiredThe application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for .
PoC
- Authenticate as a non-privileged user.
- Send the following request:
|
|
- We could observe that we have access to the page and to the function to batch unassign students from classes. And, this user, should not do that.
Impact
Broken Access Control vulnerabilities can have severe consequences, including:
- Unauthorized access to restricted functionality;
- Escalation of privileges for low-level users;
- Exposure of sensitive data and potential system compromise;
- Loss of confidentiality and integrity of educational records;
- Reputational damage to the organization.
Reference
https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-10071.md
Finder
By: CVE-Hunters