{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9106","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-17T20:37:57.777Z","datePublished":"2025-08-18T04:32:05.832Z","dateUpdated":"2025-08-18T12:48:44.562Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-18T05:47:27.098Z"},"title":"Portabilis i-Diario Informações Adicionais /planos-de-ensino-por-disciplina cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"Portabilis","product":"i-Diario","versions":[{"version":"1.0","status":"affected"},{"version":"1.1","status":"affected"},{"version":"1.2","status":"affected"},{"version":"1.3","status":"affected"},{"version":"1.4","status":"affected"},{"version":"1.5.0","status":"affected"}],"modules":["Informações Adicionais Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Portabilis i-Diario up to 1.5.0. This affects an unknown function of the file /planos-de-ensino-por-disciplina/ of the component Informações Adicionais Page. Performing manipulation of the argument Parecer/Conteúdos/Objetivos results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in Portabilis i-Diario bis 1.5.0 gefunden. Es geht um eine nicht näher bekannte Funktion der Datei /planos-de-ensino-por-disciplina/ der Komponente Informações Adicionais Page. Durch Beeinflussen des Arguments Parecer/Conteúdos/Objetivos mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-17T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-18T07:49:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"marceloQz (VulDB User)","type":"reporter"},{"lang":"en","value":"marceloQz (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.320428","name":"VDB-320428 | Portabilis i-Diario Informações Adicionais /planos-de-ensino-por-disciplina cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.320428","name":"VDB-320428 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.627567","name":"Submit #627567 | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Stored","tags":["third-party-advisory"]},{"url":"https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md","tags":["related"]},{"url":"https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc","tags":["broken-link","exploit"]}]},"adp":[{"references":[{"url":"https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md","tags":["exploit"]},{"url":"https://vuldb.com/?submit.627567","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-18T12:48:41.390001Z","id":"CVE-2025-9106","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-18T12:48:44.562Z"}}]}}