CVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
A flaw has been found in Portabilis i-Diario up to 1.5.0. The affected element is an unknown function of the file /planos-de-aulas-por-disciplina/ of the component Informações Adicionais Page. This manipulation of the argument Parecer/Objeto de Conhecimento/Habilidades causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9104 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Diario versions up to 1.5.0. The vulnerability exists in the component Informações Adicionais Page, specifically within the /planos-de-aulas-por-disciplina/ file. The flaw arises from improper handling and sanitization of the argument Parecer/Objeto de Conhecimento/Habilidades, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary for the malicious script to execute (e.g., a victim clicking a crafted link). The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation with low attack complexity but requiring user interaction and limited impact on confidentiality and integrity, with no impact on availability. The vendor has not responded to early notifications, and no patches or mitigations have been officially released. While no known exploits are currently in the wild, the public disclosure of the vulnerability increases the risk of exploitation. XSS vulnerabilities can lead to session hijacking, defacement, phishing, or redirection to malicious sites, impacting users and potentially compromising sensitive information within the affected application environment.
Potential Impact
For European organizations using Portabilis i-Diario, particularly educational institutions that rely on this software for managing lesson plans and related academic information, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially stealing session cookies, impersonating users, or delivering malware. This could lead to unauthorized access to sensitive student or staff data, reputational damage, and disruption of educational activities. Since the vulnerability requires user interaction, phishing campaigns targeting staff or students could be a vector. The lack of vendor response and absence of patches increases exposure time. Additionally, compliance with GDPR mandates protection of personal data, and exploitation of this vulnerability could lead to data breaches with regulatory consequences. The impact is heightened in environments where i-Diario is integrated with other systems or where users have elevated privileges.
Mitigation Recommendations
Organizations should implement immediate compensating controls while awaiting official patches. These include: 1) Applying web application firewall (WAF) rules to detect and block suspicious input patterns targeting the vulnerable parameters. 2) Conducting user awareness training to recognize phishing attempts that may deliver malicious links exploiting this XSS. 3) Implementing Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Reviewing and sanitizing all user-supplied input on the affected pages if custom modifications are possible. 5) Monitoring logs for unusual activity related to the vulnerable endpoints. 6) Isolating or restricting access to the affected application components where feasible. 7) Engaging with Portabilis or community forums for any unofficial patches or workarounds. 8) Planning for rapid deployment of patches once available. These measures go beyond generic advice by focusing on immediate, practical steps tailored to the vulnerability's nature and the affected environment.
Affected Countries
Portugal, Spain, Italy, France, Germany, United Kingdom, Netherlands, Belgium
CVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
Description
A flaw has been found in Portabilis i-Diario up to 1.5.0. The affected element is an unknown function of the file /planos-de-aulas-por-disciplina/ of the component Informações Adicionais Page. This manipulation of the argument Parecer/Objeto de Conhecimento/Habilidades causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9104 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Diario versions up to 1.5.0. The vulnerability exists in the component Informações Adicionais Page, specifically within the /planos-de-aulas-por-disciplina/ file. The flaw arises from improper handling and sanitization of the argument Parecer/Objeto de Conhecimento/Habilidades, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary for the malicious script to execute (e.g., a victim clicking a crafted link). The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation with low attack complexity but requiring user interaction and limited impact on confidentiality and integrity, with no impact on availability. The vendor has not responded to early notifications, and no patches or mitigations have been officially released. While no known exploits are currently in the wild, the public disclosure of the vulnerability increases the risk of exploitation. XSS vulnerabilities can lead to session hijacking, defacement, phishing, or redirection to malicious sites, impacting users and potentially compromising sensitive information within the affected application environment.
Potential Impact
For European organizations using Portabilis i-Diario, particularly educational institutions that rely on this software for managing lesson plans and related academic information, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially stealing session cookies, impersonating users, or delivering malware. This could lead to unauthorized access to sensitive student or staff data, reputational damage, and disruption of educational activities. Since the vulnerability requires user interaction, phishing campaigns targeting staff or students could be a vector. The lack of vendor response and absence of patches increases exposure time. Additionally, compliance with GDPR mandates protection of personal data, and exploitation of this vulnerability could lead to data breaches with regulatory consequences. The impact is heightened in environments where i-Diario is integrated with other systems or where users have elevated privileges.
Mitigation Recommendations
Organizations should implement immediate compensating controls while awaiting official patches. These include: 1) Applying web application firewall (WAF) rules to detect and block suspicious input patterns targeting the vulnerable parameters. 2) Conducting user awareness training to recognize phishing attempts that may deliver malicious links exploiting this XSS. 3) Implementing Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Reviewing and sanitizing all user-supplied input on the affected pages if custom modifications are possible. 5) Monitoring logs for unusual activity related to the vulnerable endpoints. 6) Isolating or restricting access to the affected application components where feasible. 7) Engaging with Portabilis or community forums for any unofficial patches or workarounds. 8) Planning for rapid deployment of patches once available. These measures go beyond generic advice by focusing on immediate, practical steps tailored to the vulnerability's nature and the affected environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-17T20:37:43.692Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a2a5e2ad5a09ad00a247e9
Added to database: 8/18/2025, 4:02:42 AM
Last enriched: 8/18/2025, 4:17:49 AM
Last updated: 8/18/2025, 6:35:12 AM
Views: 4
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.