CVE-2025-8920: Cross Site Scripting in Portabilis i-Diario
A vulnerability was identified in Portabilis i-Diario 1.6. Affected by this vulnerability is an unknown functionality of the file /dicionario-de-termos-bncc of the component Dicionário de Termos BNCC Page. The manipulation of the argument Planos de ensino leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8920 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Diario version 1.6, specifically within the component handling the 'Dicionário de Termos BNCC' page, located at the /dicionario-de-termos-bncc endpoint. The vulnerability arises from improper sanitization or validation of the 'Planos de ensino' argument, which allows an attacker to inject malicious scripts that execute in the context of a victim's browser. This vulnerability can be exploited remotely without authentication, although it requires user interaction (e.g., a victim clicking a crafted link or visiting a malicious page). The disclosed CVSS 4.8 score reflects a medium severity, indicating moderate impact and exploitability. The vendor Portabilis was notified but has not responded or issued a patch, and no official fixes are currently available. The exploit details have been publicly disclosed, increasing the risk of exploitation. XSS vulnerabilities can lead to session hijacking, credential theft, defacement, or redirection to malicious sites, compromising user confidentiality and integrity. Given the nature of i-Diario as an educational management platform, exploitation could affect students, teachers, and administrative staff by exposing sensitive educational data or enabling further attacks within the affected organizations' networks.
Potential Impact
For European organizations, particularly educational institutions or entities using Portabilis i-Diario or similar platforms, this vulnerability poses a risk to the confidentiality and integrity of user data. Attackers could leverage the XSS flaw to steal session cookies, impersonate users, or deliver malware payloads, potentially disrupting educational services or compromising personal data of students and staff. Although the CVSS score is medium, the public disclosure and lack of vendor response increase the urgency. The impact is heightened in environments where i-Diario is integrated with other systems or where users have elevated privileges. Additionally, exploitation could erode trust in digital educational tools and lead to regulatory scrutiny under GDPR if personal data is compromised. The availability impact is minimal, but the reputational and compliance consequences could be significant for affected organizations.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and output encoding on the 'Planos de ensino' parameter at the web application firewall (WAF) or reverse proxy level to block or sanitize malicious payloads. 2) Employing Content Security Policy (CSP) headers to restrict script execution and mitigate XSS impact. 3) Conducting user awareness campaigns to caution against clicking suspicious links related to the affected platform. 4) Monitoring web server logs and user activity for anomalous requests targeting /dicionario-de-termos-bncc. 5) Segregating the affected application environment to limit lateral movement if compromised. 6) Planning for an upgrade or migration to a patched version once available or considering alternative platforms if remediation is delayed. 7) Engaging with Portabilis for updates and tracking vulnerability disclosures. These steps go beyond generic advice by focusing on immediate technical controls and organizational preparedness tailored to this specific vulnerability.
Affected Countries
Portugal, Spain, Italy, France, Germany, Poland, Netherlands, Belgium
CVE-2025-8920: Cross Site Scripting in Portabilis i-Diario
Description
A vulnerability was identified in Portabilis i-Diario 1.6. Affected by this vulnerability is an unknown functionality of the file /dicionario-de-termos-bncc of the component Dicionário de Termos BNCC Page. The manipulation of the argument Planos de ensino leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8920 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Diario version 1.6, specifically within the component handling the 'Dicionário de Termos BNCC' page, located at the /dicionario-de-termos-bncc endpoint. The vulnerability arises from improper sanitization or validation of the 'Planos de ensino' argument, which allows an attacker to inject malicious scripts that execute in the context of a victim's browser. This vulnerability can be exploited remotely without authentication, although it requires user interaction (e.g., a victim clicking a crafted link or visiting a malicious page). The disclosed CVSS 4.8 score reflects a medium severity, indicating moderate impact and exploitability. The vendor Portabilis was notified but has not responded or issued a patch, and no official fixes are currently available. The exploit details have been publicly disclosed, increasing the risk of exploitation. XSS vulnerabilities can lead to session hijacking, credential theft, defacement, or redirection to malicious sites, compromising user confidentiality and integrity. Given the nature of i-Diario as an educational management platform, exploitation could affect students, teachers, and administrative staff by exposing sensitive educational data or enabling further attacks within the affected organizations' networks.
Potential Impact
For European organizations, particularly educational institutions or entities using Portabilis i-Diario or similar platforms, this vulnerability poses a risk to the confidentiality and integrity of user data. Attackers could leverage the XSS flaw to steal session cookies, impersonate users, or deliver malware payloads, potentially disrupting educational services or compromising personal data of students and staff. Although the CVSS score is medium, the public disclosure and lack of vendor response increase the urgency. The impact is heightened in environments where i-Diario is integrated with other systems or where users have elevated privileges. Additionally, exploitation could erode trust in digital educational tools and lead to regulatory scrutiny under GDPR if personal data is compromised. The availability impact is minimal, but the reputational and compliance consequences could be significant for affected organizations.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and output encoding on the 'Planos de ensino' parameter at the web application firewall (WAF) or reverse proxy level to block or sanitize malicious payloads. 2) Employing Content Security Policy (CSP) headers to restrict script execution and mitigate XSS impact. 3) Conducting user awareness campaigns to caution against clicking suspicious links related to the affected platform. 4) Monitoring web server logs and user activity for anomalous requests targeting /dicionario-de-termos-bncc. 5) Segregating the affected application environment to limit lateral movement if compromised. 6) Planning for an upgrade or migration to a patched version once available or considering alternative platforms if remediation is delayed. 7) Engaging with Portabilis for updates and tracking vulnerability disclosures. These steps go beyond generic advice by focusing on immediate technical controls and organizational preparedness tailored to this specific vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-13T10:53:04.528Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689cd6f1ad5a09ad00510175
Added to database: 8/13/2025, 6:18:25 PM
Last enriched: 8/13/2025, 6:33:06 PM
Last updated: 8/14/2025, 1:17:13 AM
Views: 5
Related Threats
CVE-2025-8937: Command Injection in TOTOLINK N350R
MediumCVE-2025-8936: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-5942: CWE-122 Heap-based Buffer Overflow in Netskope Netskope Client
MediumCVE-2025-5941: CWE-125 Out-of-Bounds Read in Netskope Netskope Client
LowCVE-2025-0309: Vulnerability in Netskope Netskope Client
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.