Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30190: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Open-Xchange GmbH OX App Suite

0
Medium
VulnerabilityCVE-2025-30190cvecve-2025-30190
Published: Thu Nov 27 2025 (11/27/2025, 09:23:08 UTC)
Source: CVE Database V5
Vendor/Project: Open-Xchange GmbH
Product: OX App Suite

Description

Malicious content at office documents can be used to inject script code when editing a document. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the provided updates and patch releases. No publicly available exploits are known

AI-Powered Analysis

AILast updated: 11/27/2025, 10:18:36 UTC

Technical Analysis

CVE-2025-30190 is a cross-site scripting vulnerability identified in Open-Xchange GmbH's OX App Suite, a widely used collaborative office and communication platform. The vulnerability stems from improper neutralization of input during web page generation, specifically when users edit office documents within the suite. Maliciously crafted office documents can embed script code that executes in the context of the user's session when the document is opened or edited. This allows attackers to perform actions such as exfiltrating sensitive information, manipulating user data, or triggering unintended operations without requiring authentication but necessitating user interaction (opening/editing the document). The CVSS v3.1 base score is 5.4, indicating medium severity, with an attack vector over the network, low attack complexity, no privileges required, but user interaction needed. The vulnerability affects all versions of OX App Suite prior to the patch release. Although no public exploits are currently available, the risk remains significant due to the potential for targeted phishing or social engineering attacks leveraging malicious documents. The vulnerability highlights the importance of robust input validation and output encoding in web applications that process user-generated content, especially in collaborative environments.

Potential Impact

For European organizations, this vulnerability poses a risk of data leakage and unauthorized actions within OX App Suite environments. Given the platform's use in email, calendaring, and document collaboration, exploitation could lead to exposure of confidential business information, intellectual property, or personal data protected under GDPR. The attack could facilitate lateral movement or privilege escalation if combined with other vulnerabilities or misconfigurations. Disruption of business workflows and loss of user trust are additional concerns. Organizations in sectors such as finance, government, and healthcare, which often use OX App Suite or similar platforms, may face regulatory and reputational consequences if exploited. The medium severity indicates moderate impact but ease of exploitation via social engineering increases the threat level. The absence of public exploits reduces immediate widespread risk but does not eliminate targeted attack possibilities.

Mitigation Recommendations

Organizations should promptly apply the security patches released by Open-Xchange GmbH to remediate this vulnerability. In addition, implement strict content security policies (CSP) to limit script execution contexts within the OX App Suite environment. Employ email and document filtering solutions to detect and block malicious attachments or embedded scripts. Train users to recognize and avoid opening suspicious or unexpected office documents, especially from untrusted sources. Monitor logs for unusual activity related to document editing or script execution within the platform. Consider deploying web application firewalls (WAF) with rules tailored to detect XSS payloads targeting OX App Suite. Regularly review and update security configurations and conduct penetration testing focused on input validation and script injection vectors. Finally, maintain an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2025-03-18T08:39:46.884Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6928251f23c3d7b26904cfd1

Added to database: 11/27/2025, 10:17:03 AM

Last enriched: 11/27/2025, 10:18:36 AM

Last updated: 11/27/2025, 12:21:44 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats