Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54760: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO

0
Medium
VulnerabilityCVE-2025-54760cvecve-2025-54760
Published: Thu Oct 16 2025 (10/16/2025, 10:03:19 UTC)
Source: CVE Database V5
Vendor/Project: NEOJAPAN Inc.
Product: desknet's NEO

Description

CVE-2025-54760 is a stored cross-site scripting (XSS) vulnerability affecting desknet's NEO versions 9. 0R2. 0 and earlier. This flaw allows authenticated users to inject malicious JavaScript code that executes in other users' browsers, potentially leading to session hijacking, data theft, or unauthorized actions. The vulnerability requires low privileges but does need user interaction to trigger the malicious script. It has a CVSS 3. 0 base score of 5. 4, indicating medium severity with limited confidentiality and integrity impact but no direct availability impact. No known exploits are currently reported in the wild. European organizations using desknet's NEO, especially in countries with significant adoption of this collaboration software, should prioritize patching or mitigating this issue to prevent exploitation.

AI-Powered Analysis

AILast updated: 10/16/2025, 10:30:10 UTC

Technical Analysis

CVE-2025-54760 is a stored cross-site scripting (XSS) vulnerability identified in NEOJAPAN Inc.'s desknet's NEO collaboration software, specifically affecting versions 9.0R2.0 and earlier. Stored XSS occurs when malicious input is saved by the application and later rendered in users' browsers without proper sanitization, enabling arbitrary JavaScript execution. This vulnerability allows an authenticated user with low privileges to inject malicious scripts into the application, which are then executed in the context of other users who view the affected content. The CVSS 3.0 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, requires privileges but only low-level user rights, and needs user interaction to trigger. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not impact availability. Potential consequences include session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and possible lateral movement within the network. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of official patches or links suggests that organizations must rely on vendor advisories or implement mitigations themselves. Given that desknet's NEO is used primarily in enterprise and government environments for collaboration and communication, exploitation could lead to significant data exposure or operational disruption.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of data handled within desknet's NEO. Attackers could leverage the stored XSS to hijack user sessions, steal credentials or sensitive information, and perform unauthorized actions under the guise of legitimate users. This is particularly concerning for organizations using desknet's NEO for internal communications, project management, or document sharing, as sensitive corporate or governmental data could be exposed. The requirement for user interaction and low privilege reduces the ease of exploitation but does not eliminate risk, especially in environments with many users and frequent collaboration. The medium CVSS score reflects this balanced risk. If exploited, attackers could gain footholds for further attacks or data exfiltration. European entities with regulatory obligations under GDPR must consider the potential data breach implications and associated compliance risks. The absence of known exploits currently reduces immediate threat but does not preclude future attacks.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation approach: 1) Apply any available patches or updates from NEOJAPAN Inc. as soon as they are released. 2) If patches are not yet available, implement strict input validation and output encoding on all user-supplied data fields within desknet's NEO to prevent script injection and execution. 3) Restrict user privileges to the minimum necessary, limiting the ability of low-privilege users to inject content that is rendered by others. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the application. 5) Conduct user awareness training to recognize suspicious behavior or unexpected prompts within the application. 6) Monitor logs and network traffic for unusual activity indicative of XSS exploitation attempts. 7) Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting desknet's NEO. 8) Regularly audit and review collaboration content for suspicious or unexpected scripts or markup. These steps go beyond generic advice by focusing on compensating controls and proactive detection in the absence of immediate patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-09-01T11:21:42.874Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f0c5669f8a5dbaeac6c231

Added to database: 10/16/2025, 10:13:58 AM

Last enriched: 10/16/2025, 10:30:10 AM

Last updated: 10/16/2025, 1:41:21 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats