Skip to main content

CVE-2025-9106: Cross Site Scripting in Portabilis i-Diario

Medium
VulnerabilityCVE-2025-9106cvecve-2025-9106
Published: Mon Aug 18 2025 (08/18/2025, 04:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Portabilis
Product: i-Diario

Description

A vulnerability was found in Portabilis i-Diario up to 1.5.0. This affects an unknown function of the file /planos-de-ensino-por-disciplina/ of the component Informações Adicionais Page. Performing manipulation of the argument Parecer/Conteúdos/Objetivos results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/18/2025, 05:02:59 UTC

Technical Analysis

CVE-2025-9106 is a cross-site scripting (XSS) vulnerability identified in the Portabilis i-Diario application, specifically affecting versions up to 1.5.0. The vulnerability resides in the component handling the /planos-de-ensino-por-disciplina/ path, within the Informações Adicionais Page. The flaw arises from improper sanitization or validation of user-supplied input in the parameters Parecer, Conteúdos, and Objetivos. An attacker can remotely craft malicious input to these parameters, which is then reflected in the web page without adequate encoding or filtering, enabling execution of arbitrary JavaScript code in the context of the victim's browser. The vulnerability requires low privileges (PR:L) and user interaction (UI:P), meaning an attacker must trick a user into clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality and integrity. The vendor has been contacted but has not responded or issued a patch, and no known exploits are currently observed in the wild. However, the exploit details have been publicly disclosed, increasing the risk of exploitation. XSS vulnerabilities can lead to session hijacking, credential theft, defacement, or redirection to malicious sites, impacting users and the integrity of the affected web application. The lack of vendor response and patch availability increases exposure for organizations using i-Diario versions up to 1.5.0.

Potential Impact

For European organizations using Portabilis i-Diario, particularly educational institutions that rely on this platform for managing teaching plans and related academic content, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute malicious scripts in the browsers of educators, students, or administrators, potentially leading to theft of session cookies, unauthorized actions on behalf of users, or distribution of malware. This could disrupt educational activities, compromise user privacy, and damage institutional reputation. Since the vulnerability requires user interaction, phishing or social engineering campaigns targeting users of the platform could be effective. The absence of a vendor patch and public disclosure increases the urgency for mitigation. Additionally, given the sensitive nature of educational data and the increasing focus on data protection under GDPR, any compromise could have regulatory and compliance implications for European entities.

Mitigation Recommendations

Organizations should immediately implement input validation and output encoding controls at their application or web server level as a temporary mitigation. Web Application Firewalls (WAFs) can be configured to detect and block suspicious payloads targeting the vulnerable parameters (Parecer, Conteúdos, Objetivos). User awareness training should be enhanced to reduce the risk of phishing or social engineering attacks exploiting this vulnerability. Monitoring and logging of web application traffic should be increased to detect potential exploitation attempts. If possible, organizations should consider upgrading to a newer, unaffected version of i-Diario once available or applying custom patches to sanitize inputs. Isolating the affected component or restricting access to trusted users can reduce exposure. Regular backups and incident response plans should be reviewed and updated to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-17T20:37:57.777Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a2b06cad5a09ad00a2881d

Added to database: 8/18/2025, 4:47:40 AM

Last enriched: 8/18/2025, 5:02:59 AM

Last updated: 8/18/2025, 6:35:13 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats