CVE-2025-8919: Cross Site Scripting in Portabilis i-Diario
A vulnerability was determined in Portabilis i-Diario up to 1.6. Affected is an unknown function of the file /objetivos-de-aprendizagem-e-habilidades of the component History Page. The manipulation of the argument código/objetivo habilidade leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8919 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Diario software, versions 1.0 through 1.6. The vulnerability resides in an unspecified function within the /objetivos-de-aprendizagem-e-habilidades file, part of the History Page component. The issue arises from improper sanitization or validation of the 'código/objetivo habilidade' argument, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, although it requires some user interaction (e.g., a victim clicking a crafted link or visiting a malicious page). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but this conflicts with the description; likely a vendor error or partial requirement), user interaction required (UI:P), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. The vendor was notified but did not respond, and no patches or mitigations have been published. Although no known exploits are currently in the wild, the public disclosure of the exploit increases the risk of exploitation. XSS vulnerabilities can be leveraged to steal session cookies, perform actions on behalf of users, or deliver malware, especially in web applications used in educational environments like i-Diario, which is a digital diary and school management system widely used in Brazil and potentially other Portuguese-speaking countries.
Potential Impact
For European organizations, the impact of this vulnerability depends on the adoption of Portabilis i-Diario or similar systems. If deployed, attackers could exploit the XSS flaw to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, unauthorized actions, or phishing attacks targeting educators, students, or administrators. This could compromise user privacy and data integrity within educational institutions. Although the CVSS score is medium, the risk is heightened by the lack of vendor response and absence of patches. The vulnerability could also be used as a foothold for further attacks within the network if combined with other vulnerabilities or social engineering. Given the educational focus, the impact on confidentiality is limited but the integrity of educational records and user trust could be damaged. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments where users may be less security-aware.
Mitigation Recommendations
European organizations using Portabilis i-Diario should immediately implement input validation and output encoding on the affected parameters, particularly 'código/objetivo habilidade', to neutralize malicious scripts. Employing a web application firewall (WAF) with custom rules to detect and block XSS payloads targeting this endpoint can provide interim protection. Administrators should educate users about the risks of clicking unknown links and encourage cautious behavior. Monitoring web logs for suspicious requests to the /objetivos-de-aprendizagem-e-habilidades path can help detect exploitation attempts. If possible, isolate the affected component or restrict access to trusted users until a vendor patch is available. Organizations should also consider migrating to alternative platforms with better security support if vendor responsiveness remains absent. Regular security assessments and penetration testing focused on XSS and input validation should be conducted to identify similar issues proactively.
Affected Countries
Portugal, Spain, France, Germany, Italy
CVE-2025-8919: Cross Site Scripting in Portabilis i-Diario
Description
A vulnerability was determined in Portabilis i-Diario up to 1.6. Affected is an unknown function of the file /objetivos-de-aprendizagem-e-habilidades of the component History Page. The manipulation of the argument código/objetivo habilidade leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8919 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Diario software, versions 1.0 through 1.6. The vulnerability resides in an unspecified function within the /objetivos-de-aprendizagem-e-habilidades file, part of the History Page component. The issue arises from improper sanitization or validation of the 'código/objetivo habilidade' argument, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, although it requires some user interaction (e.g., a victim clicking a crafted link or visiting a malicious page). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but this conflicts with the description; likely a vendor error or partial requirement), user interaction required (UI:P), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. The vendor was notified but did not respond, and no patches or mitigations have been published. Although no known exploits are currently in the wild, the public disclosure of the exploit increases the risk of exploitation. XSS vulnerabilities can be leveraged to steal session cookies, perform actions on behalf of users, or deliver malware, especially in web applications used in educational environments like i-Diario, which is a digital diary and school management system widely used in Brazil and potentially other Portuguese-speaking countries.
Potential Impact
For European organizations, the impact of this vulnerability depends on the adoption of Portabilis i-Diario or similar systems. If deployed, attackers could exploit the XSS flaw to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, unauthorized actions, or phishing attacks targeting educators, students, or administrators. This could compromise user privacy and data integrity within educational institutions. Although the CVSS score is medium, the risk is heightened by the lack of vendor response and absence of patches. The vulnerability could also be used as a foothold for further attacks within the network if combined with other vulnerabilities or social engineering. Given the educational focus, the impact on confidentiality is limited but the integrity of educational records and user trust could be damaged. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments where users may be less security-aware.
Mitigation Recommendations
European organizations using Portabilis i-Diario should immediately implement input validation and output encoding on the affected parameters, particularly 'código/objetivo habilidade', to neutralize malicious scripts. Employing a web application firewall (WAF) with custom rules to detect and block XSS payloads targeting this endpoint can provide interim protection. Administrators should educate users about the risks of clicking unknown links and encourage cautious behavior. Monitoring web logs for suspicious requests to the /objetivos-de-aprendizagem-e-habilidades path can help detect exploitation attempts. If possible, isolate the affected component or restrict access to trusted users until a vendor patch is available. Organizations should also consider migrating to alternative platforms with better security support if vendor responsiveness remains absent. Regular security assessments and penetration testing focused on XSS and input validation should be conducted to identify similar issues proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-13T10:53:00.673Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689ccfdaad5a09ad004fb50b
Added to database: 8/13/2025, 5:48:10 PM
Last enriched: 8/21/2025, 1:00:08 AM
Last updated: 9/26/2025, 5:56:51 AM
Views: 30
Related Threats
CVE-2025-9816: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in veronalabs WP Statistics – Simple, privacy-friendly Google Analytics alternative
HighCVE-2025-11050: Improper Authorization in Portabilis i-Educar
MediumCVE-2025-10499: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-10498: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-8440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in spwebguy Team Members
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.