Skip to main content

CVE-2025-9104: Cross Site Scripting in Portabilis i-Diario

Medium
VulnerabilityCVE-2025-9104cvecve-2025-9104
Published: Mon Aug 18 2025 (08/18/2025, 03:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Diario

Description

A flaw has been found in Portabilis i-Diario up to 1.5.0. The affected element is an unknown function of the file /planos-de-aulas-por-disciplina/ of the component Informações Adicionais Page. This manipulation of the argument Parecer/Objeto de Conhecimento/Habilidades causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/18/2025, 04:17:49 UTC

Technical Analysis

CVE-2025-9104 is a cross-site scripting (XSS) vulnerability identified in Portabilis i-Diario versions up to 1.5.0. The vulnerability exists in the component Informações Adicionais Page, specifically within the /planos-de-aulas-por-disciplina/ file. The flaw arises from improper handling and sanitization of the argument Parecer/Objeto de Conhecimento/Habilidades, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary for the malicious script to execute (e.g., a victim clicking a crafted link). The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation with low attack complexity but requiring user interaction and limited impact on confidentiality and integrity, with no impact on availability. The vendor has not responded to early notifications, and no patches or mitigations have been officially released. While no known exploits are currently in the wild, the public disclosure of the vulnerability increases the risk of exploitation. XSS vulnerabilities can lead to session hijacking, defacement, phishing, or redirection to malicious sites, impacting users and potentially compromising sensitive information within the affected application environment.

Potential Impact

For European organizations using Portabilis i-Diario, particularly educational institutions that rely on this software for managing lesson plans and related academic information, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially stealing session cookies, impersonating users, or delivering malware. This could lead to unauthorized access to sensitive student or staff data, reputational damage, and disruption of educational activities. Since the vulnerability requires user interaction, phishing campaigns targeting staff or students could be a vector. The lack of vendor response and absence of patches increases exposure time. Additionally, compliance with GDPR mandates protection of personal data, and exploitation of this vulnerability could lead to data breaches with regulatory consequences. The impact is heightened in environments where i-Diario is integrated with other systems or where users have elevated privileges.

Mitigation Recommendations

Organizations should implement immediate compensating controls while awaiting official patches. These include: 1) Applying web application firewall (WAF) rules to detect and block suspicious input patterns targeting the vulnerable parameters. 2) Conducting user awareness training to recognize phishing attempts that may deliver malicious links exploiting this XSS. 3) Implementing Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Reviewing and sanitizing all user-supplied input on the affected pages if custom modifications are possible. 5) Monitoring logs for unusual activity related to the vulnerable endpoints. 6) Isolating or restricting access to the affected application components where feasible. 7) Engaging with Portabilis or community forums for any unofficial patches or workarounds. 8) Planning for rapid deployment of patches once available. These measures go beyond generic advice by focusing on immediate, practical steps tailored to the vulnerability's nature and the affected environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-17T20:37:43.692Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a2a5e2ad5a09ad00a247e9

Added to database: 8/18/2025, 4:02:42 AM

Last enriched: 8/18/2025, 4:17:49 AM

Last updated: 8/18/2025, 6:35:12 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats