Skip to main content

CVE-2025-8919: Cross Site Scripting in Portabilis i-Diario

Medium
VulnerabilityCVE-2025-8919cvecve-2025-8919
Published: Wed Aug 13 2025 (08/13/2025, 17:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Diario

Description

A vulnerability was determined in Portabilis i-Diario up to 1.6. Affected is an unknown function of the file /objetivos-de-aprendizagem-e-habilidades of the component History Page. The manipulation of the argument código/objetivo habilidade leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/13/2025, 18:04:20 UTC

Technical Analysis

CVE-2025-8919 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Diario software, versions 1.0 through 1.6. The vulnerability resides in an unspecified function within the /objetivos-de-aprendizagem-e-habilidades file, part of the History Page component. Specifically, the flaw arises from improper handling and sanitization of the 'código/objetivo habilidade' parameter, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is exploitable remotely without requiring authentication, but it does require user interaction to trigger the malicious payload (e.g., a victim clicking a crafted link). The vendor has been notified but has not responded or issued a patch. The CVSS v4.0 base score is 4.8 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but user interaction needed. The impact primarily affects confidentiality and integrity at a low level, with no direct impact on availability or system control. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability could allow attackers to execute arbitrary JavaScript in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions within the affected web application.

Potential Impact

For European organizations using Portabilis i-Diario, particularly educational institutions or administrative bodies managing learning objectives and student records, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive student data or manipulation of educational records through session hijacking or theft of authentication tokens. Given that i-Diario is an educational management platform, the confidentiality and integrity of student information and academic records are critical. An attacker exploiting this XSS flaw could also conduct phishing attacks or deliver malware via the compromised web interface. While the vulnerability does not directly impact system availability, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls to mitigate the risk.

Mitigation Recommendations

Organizations should immediately implement input validation and output encoding controls on the 'código/objetivo habilidade' parameter to prevent injection of malicious scripts. Web application firewalls (WAFs) can be configured with custom rules to detect and block suspicious payloads targeting this parameter. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regularly monitor web server logs for unusual requests or patterns indicative of exploitation attempts. Since no official patch is available, organizations should consider isolating or restricting access to the affected component where feasible. User awareness training is also critical to reduce the risk of users interacting with malicious links. Finally, organizations should engage with Portabilis for updates and consider alternative solutions if remediation is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T10:53:00.673Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689ccfdaad5a09ad004fb50b

Added to database: 8/13/2025, 5:48:10 PM

Last enriched: 8/13/2025, 6:04:20 PM

Last updated: 8/14/2025, 6:03:54 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats