CVE-2025-10254: Cross Site Scripting in Ascensio System SIA OnlyOffice
A vulnerability was found in Ascensio System SIA OnlyOffice up to 12.7.0. This issue affects some unknown processing of the file /Products/Projects/Messages.aspx of the component SVG Image Handler. Performing manipulation results in cross site scripting. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was informed early about this issue and replied: "We are already working on this case, and the issues will be resolved in one of the upcoming patches."
AI Analysis
Technical Summary
CVE-2025-10254 is a cross-site scripting (XSS) vulnerability identified in Ascensio System SIA's OnlyOffice product, affecting versions up to 12.7.0. The vulnerability resides in the SVG Image Handler component, specifically in the file /Products/Projects/Messages.aspx. The flaw arises from improper processing of input data related to SVG images, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. This can be triggered remotely without authentication, although user interaction is required to trigger the malicious payload (e.g., by viewing a crafted message). The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The vector string indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), user interaction required (UI:P), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. The vendor has acknowledged the issue and is working on patches, but no patch links are currently available. No known exploits are reported in the wild yet, but public exploit details exist, increasing the risk of exploitation. This vulnerability could be leveraged to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks within the OnlyOffice environment.
Potential Impact
For European organizations using OnlyOffice versions up to 12.7.0, this XSS vulnerability poses a risk of session hijacking, unauthorized actions, and potential lateral movement within internal networks. Since OnlyOffice is often used for document collaboration and project management, exploitation could lead to exposure of sensitive project data or manipulation of project communications. The medium severity suggests that while the impact is not catastrophic, it can facilitate further attacks or data leakage. European organizations in sectors such as finance, government, and critical infrastructure that rely on OnlyOffice for collaboration may face reputational damage, compliance violations (e.g., GDPR), and operational disruptions if attackers exploit this vulnerability. The requirement for user interaction means phishing or social engineering may be used to trigger the exploit, increasing the risk in environments with less security awareness.
Mitigation Recommendations
Organizations should prioritize upgrading OnlyOffice to a patched version once available from Ascensio System SIA. Until patches are released, administrators should implement strict input validation and sanitization on the affected SVG Image Handler component if possible. Deploying web application firewalls (WAFs) with custom rules to detect and block suspicious SVG payloads or script injections targeting /Products/Projects/Messages.aspx can reduce exposure. User training to recognize phishing attempts and suspicious links is critical to mitigate user interaction risks. Additionally, restricting OnlyOffice access to trusted networks and enforcing multi-factor authentication (MFA) can limit the impact of session hijacking. Monitoring logs for unusual activity related to OnlyOffice message components and conducting regular vulnerability scans will help detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-10254: Cross Site Scripting in Ascensio System SIA OnlyOffice
Description
A vulnerability was found in Ascensio System SIA OnlyOffice up to 12.7.0. This issue affects some unknown processing of the file /Products/Projects/Messages.aspx of the component SVG Image Handler. Performing manipulation results in cross site scripting. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was informed early about this issue and replied: "We are already working on this case, and the issues will be resolved in one of the upcoming patches."
AI-Powered Analysis
Technical Analysis
CVE-2025-10254 is a cross-site scripting (XSS) vulnerability identified in Ascensio System SIA's OnlyOffice product, affecting versions up to 12.7.0. The vulnerability resides in the SVG Image Handler component, specifically in the file /Products/Projects/Messages.aspx. The flaw arises from improper processing of input data related to SVG images, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. This can be triggered remotely without authentication, although user interaction is required to trigger the malicious payload (e.g., by viewing a crafted message). The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The vector string indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), user interaction required (UI:P), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. The vendor has acknowledged the issue and is working on patches, but no patch links are currently available. No known exploits are reported in the wild yet, but public exploit details exist, increasing the risk of exploitation. This vulnerability could be leveraged to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks within the OnlyOffice environment.
Potential Impact
For European organizations using OnlyOffice versions up to 12.7.0, this XSS vulnerability poses a risk of session hijacking, unauthorized actions, and potential lateral movement within internal networks. Since OnlyOffice is often used for document collaboration and project management, exploitation could lead to exposure of sensitive project data or manipulation of project communications. The medium severity suggests that while the impact is not catastrophic, it can facilitate further attacks or data leakage. European organizations in sectors such as finance, government, and critical infrastructure that rely on OnlyOffice for collaboration may face reputational damage, compliance violations (e.g., GDPR), and operational disruptions if attackers exploit this vulnerability. The requirement for user interaction means phishing or social engineering may be used to trigger the exploit, increasing the risk in environments with less security awareness.
Mitigation Recommendations
Organizations should prioritize upgrading OnlyOffice to a patched version once available from Ascensio System SIA. Until patches are released, administrators should implement strict input validation and sanitization on the affected SVG Image Handler component if possible. Deploying web application firewalls (WAFs) with custom rules to detect and block suspicious SVG payloads or script injections targeting /Products/Projects/Messages.aspx can reduce exposure. User training to recognize phishing attempts and suspicious links is critical to mitigate user interaction risks. Additionally, restricting OnlyOffice access to trusted networks and enforcing multi-factor authentication (MFA) can limit the impact of session hijacking. Monitoring logs for unusual activity related to OnlyOffice message components and conducting regular vulnerability scans will help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-11T05:42:03.823Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c2ecd12dd08e98e9c669ec
Added to database: 9/11/2025, 3:37:53 PM
Last enriched: 9/11/2025, 3:38:06 PM
Last updated: 9/11/2025, 5:42:31 PM
Views: 4
Related Threats
CVE-2025-9319: CWE-494: Download of Code Without Integrity Check in Lenovo Wallpaper Client
HighCVE-2025-9214: CWE-306: Missing Authentication for Critical Function in Lenovo LJ2206W Printer
MediumCVE-2025-9201: CWE-427: Uncontrolled Search Path Element in Lenovo Browser
HighCVE-2025-8557: CWE-420: Unprotected Alternate Channel in Lenovo XClarity Orchestrator (LXCO)
HighCVE-2025-8061: CWE-782: Exposed IOCTL with Insufficient Access Control in Lenovo Dispatcher 3.0 Driver
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.