A vulnerability was determined in Portabilis i-Diario up to 1.5.0. This impacts an unknown function of the file /alunos/search_autocomplete. Executing manipulation of the argument q can lead to cross site scripting. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md | Exploit Third Party Advisory |
https://github.com/marcelomulder/CVE/blob/main/i-diario/Reflected%20XSS%20endpoint%20search_autocomplete%20parameter%20q.md#poc | Broken Link |
https://vuldb.com/?ctiid.320429 | Permissions Required VDB Entry |
https://vuldb.com/?id.320429 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.627568 | Third Party Advisory VDB Entry |
https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md | Exploit Third Party Advisory |
https://vuldb.com/?submit.627568 | Third Party Advisory VDB Entry |
Configurations
History
02 Sep 2025, 18:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md - Exploit, Third Party Advisory | |
References | () https://github.com/marcelomulder/CVE/blob/main/i-diario/Reflected%20XSS%20endpoint%20search_autocomplete%20parameter%20q.md#poc - Broken Link | |
References | () https://vuldb.com/?ctiid.320429 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.320429 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.627568 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:portabilis:i-diario:*:*:*:*:*:*:*:* | |
First Time |
Portabilis
Portabilis i-diario |
|
Summary | (es) Se detectó una vulnerabilidad en Portabilis i-Diario hasta la versión 1.5.0. Esta afecta a una función desconocida del archivo /alunos/search_autocomplete. La manipulación del argumento q puede provocar ataques de Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación sobre esta divulgación, pero no respondió. |
18 Aug 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md - | |
References | () https://vuldb.com/?submit.627568 - | |
Summary |
|
18 Aug 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) A vulnerability was determined in Portabilis i-Diario up to 1.5.0. This impacts an unknown function of the file /alunos/search_autocomplete. Executing manipulation of the argument q can lead to cross site scripting. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
18 Aug 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-18 05:15
Updated : 2025-09-02 18:22
NVD link : CVE-2025-9107
Mitre link : CVE-2025-9107
CVE.ORG link : CVE-2025-9107
JSON object : View
Products Affected
portabilis
- i-diario