CVE-2025-54760: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
CVE-2025-54760 is a stored cross-site scripting (XSS) vulnerability affecting desknet's NEO versions 9. 0R2. 0 and earlier. This flaw allows authenticated users to inject malicious JavaScript code that executes in other users' browsers, potentially leading to session hijacking, data theft, or unauthorized actions. The vulnerability requires low privileges but does need user interaction to trigger the malicious script. It has a CVSS 3. 0 base score of 5. 4, indicating medium severity with limited confidentiality and integrity impact but no direct availability impact. No known exploits are currently reported in the wild. European organizations using desknet's NEO, especially in countries with significant adoption of this collaboration software, should prioritize patching or mitigating this issue to prevent exploitation.
AI Analysis
Technical Summary
CVE-2025-54760 is a stored cross-site scripting (XSS) vulnerability identified in NEOJAPAN Inc.'s desknet's NEO collaboration software, specifically affecting versions 9.0R2.0 and earlier. Stored XSS occurs when malicious input is saved by the application and later rendered in users' browsers without proper sanitization, enabling arbitrary JavaScript execution. This vulnerability allows an authenticated user with low privileges to inject malicious scripts into the application, which are then executed in the context of other users who view the affected content. The CVSS 3.0 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, requires privileges but only low-level user rights, and needs user interaction to trigger. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not impact availability. Potential consequences include session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and possible lateral movement within the network. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of official patches or links suggests that organizations must rely on vendor advisories or implement mitigations themselves. Given that desknet's NEO is used primarily in enterprise and government environments for collaboration and communication, exploitation could lead to significant data exposure or operational disruption.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of data handled within desknet's NEO. Attackers could leverage the stored XSS to hijack user sessions, steal credentials or sensitive information, and perform unauthorized actions under the guise of legitimate users. This is particularly concerning for organizations using desknet's NEO for internal communications, project management, or document sharing, as sensitive corporate or governmental data could be exposed. The requirement for user interaction and low privilege reduces the ease of exploitation but does not eliminate risk, especially in environments with many users and frequent collaboration. The medium CVSS score reflects this balanced risk. If exploited, attackers could gain footholds for further attacks or data exfiltration. European entities with regulatory obligations under GDPR must consider the potential data breach implications and associated compliance risks. The absence of known exploits currently reduces immediate threat but does not preclude future attacks.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation approach: 1) Apply any available patches or updates from NEOJAPAN Inc. as soon as they are released. 2) If patches are not yet available, implement strict input validation and output encoding on all user-supplied data fields within desknet's NEO to prevent script injection and execution. 3) Restrict user privileges to the minimum necessary, limiting the ability of low-privilege users to inject content that is rendered by others. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the application. 5) Conduct user awareness training to recognize suspicious behavior or unexpected prompts within the application. 6) Monitor logs and network traffic for unusual activity indicative of XSS exploitation attempts. 7) Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting desknet's NEO. 8) Regularly audit and review collaboration content for suspicious or unexpected scripts or markup. These steps go beyond generic advice by focusing on compensating controls and proactive detection in the absence of immediate patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
CVE-2025-54760: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
Description
CVE-2025-54760 is a stored cross-site scripting (XSS) vulnerability affecting desknet's NEO versions 9. 0R2. 0 and earlier. This flaw allows authenticated users to inject malicious JavaScript code that executes in other users' browsers, potentially leading to session hijacking, data theft, or unauthorized actions. The vulnerability requires low privileges but does need user interaction to trigger the malicious script. It has a CVSS 3. 0 base score of 5. 4, indicating medium severity with limited confidentiality and integrity impact but no direct availability impact. No known exploits are currently reported in the wild. European organizations using desknet's NEO, especially in countries with significant adoption of this collaboration software, should prioritize patching or mitigating this issue to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-54760 is a stored cross-site scripting (XSS) vulnerability identified in NEOJAPAN Inc.'s desknet's NEO collaboration software, specifically affecting versions 9.0R2.0 and earlier. Stored XSS occurs when malicious input is saved by the application and later rendered in users' browsers without proper sanitization, enabling arbitrary JavaScript execution. This vulnerability allows an authenticated user with low privileges to inject malicious scripts into the application, which are then executed in the context of other users who view the affected content. The CVSS 3.0 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, requires privileges but only low-level user rights, and needs user interaction to trigger. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not impact availability. Potential consequences include session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and possible lateral movement within the network. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of official patches or links suggests that organizations must rely on vendor advisories or implement mitigations themselves. Given that desknet's NEO is used primarily in enterprise and government environments for collaboration and communication, exploitation could lead to significant data exposure or operational disruption.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of data handled within desknet's NEO. Attackers could leverage the stored XSS to hijack user sessions, steal credentials or sensitive information, and perform unauthorized actions under the guise of legitimate users. This is particularly concerning for organizations using desknet's NEO for internal communications, project management, or document sharing, as sensitive corporate or governmental data could be exposed. The requirement for user interaction and low privilege reduces the ease of exploitation but does not eliminate risk, especially in environments with many users and frequent collaboration. The medium CVSS score reflects this balanced risk. If exploited, attackers could gain footholds for further attacks or data exfiltration. European entities with regulatory obligations under GDPR must consider the potential data breach implications and associated compliance risks. The absence of known exploits currently reduces immediate threat but does not preclude future attacks.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation approach: 1) Apply any available patches or updates from NEOJAPAN Inc. as soon as they are released. 2) If patches are not yet available, implement strict input validation and output encoding on all user-supplied data fields within desknet's NEO to prevent script injection and execution. 3) Restrict user privileges to the minimum necessary, limiting the ability of low-privilege users to inject content that is rendered by others. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the application. 5) Conduct user awareness training to recognize suspicious behavior or unexpected prompts within the application. 6) Monitor logs and network traffic for unusual activity indicative of XSS exploitation attempts. 7) Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting desknet's NEO. 8) Regularly audit and review collaboration content for suspicious or unexpected scripts or markup. These steps go beyond generic advice by focusing on compensating controls and proactive detection in the absence of immediate patches.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-09-01T11:21:42.874Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68f0c5669f8a5dbaeac6c231
Added to database: 10/16/2025, 10:13:58 AM
Last enriched: 10/16/2025, 10:30:10 AM
Last updated: 10/16/2025, 1:41:21 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9804: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
CriticalCVE-2025-9152: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.