A vulnerability was determined in Portabilis i-Diario up to 1.5.0. This impacts an unknown function of the file /alunos/search_autocomplete. Executing manipulation of the argument q can lead to cross site scripting. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md | Exploit Third Party Advisory |
| https://github.com/marcelomulder/CVE/blob/main/i-diario/Reflected%20XSS%20endpoint%20search_autocomplete%20parameter%20q.md#poc | Broken Link |
| https://vuldb.com/?ctiid.320429 | Permissions Required VDB Entry |
| https://vuldb.com/?id.320429 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.627568 | Third Party Advisory VDB Entry |
| https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md | Exploit Third Party Advisory |
| https://vuldb.com/?submit.627568 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-08-18 05:15
Updated : 2025-09-02 18:22
NVD link : CVE-2025-9107
Mitre link : CVE-2025-9107
CVE.ORG link : CVE-2025-9107
JSON object : View
Products Affected
portabilis
- i-diario
