Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54859: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO

0
Medium
VulnerabilityCVE-2025-54859cvecve-2025-54859
Published: Thu Oct 16 2025 (10/16/2025, 10:03:24 UTC)
Source: CVE Database V5
Vendor/Project: NEOJAPAN Inc.
Product: desknet's NEO

Description

CVE-2025-54859 is a stored cross-site scripting (XSS) vulnerability affecting desknet's NEO versions 9. 0R2. 0 and earlier. This flaw allows authenticated users with high privileges to inject malicious JavaScript code that executes in other users' browsers, potentially leading to data theft or session hijacking. The vulnerability requires user interaction and high privileges, limiting its exploitation scope. The CVSS score is 4. 8 (medium severity), reflecting limited impact on confidentiality and integrity without direct availability impact. European organizations using desknet's NEO, especially in countries with significant adoption of this collaboration software, could be targeted. Mitigation involves applying vendor patches once available, restricting high-privilege user access, and implementing robust input validation and Content Security Policies. Countries like Germany, France, and the UK are more likely affected due to their higher usage of enterprise collaboration tools and presence of organizations using desknet's NEO.

AI-Powered Analysis

AILast updated: 10/16/2025, 10:29:54 UTC

Technical Analysis

CVE-2025-54859 is a stored cross-site scripting (XSS) vulnerability identified in NEOJAPAN Inc.'s desknet's NEO collaboration software, specifically affecting versions 9.0R2.0 and earlier. Stored XSS vulnerabilities occur when malicious scripts injected by an attacker are permanently stored on the target server, such as in databases or message boards, and then executed in the browsers of users who access the affected content. In this case, the vulnerability allows an authenticated user with high privileges to inject arbitrary JavaScript code into the application. When other users view the infected content, the malicious script executes in their browsers, potentially enabling session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The CVSS vector indicates the attack requires network access (AV:N), low attack complexity (AC:L), high privileges (PR:H), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). No known exploits are currently in the wild, and no official patches have been linked yet. The vulnerability was published in October 2025, with the initial reservation in September 2025 by JPCERT. This vulnerability is particularly concerning in environments where desknet's NEO is used for internal communication and collaboration, as it could allow attackers to leverage trusted sessions to escalate attacks or steal sensitive information.

Potential Impact

For European organizations, the impact of CVE-2025-54859 can be significant in environments where desknet's NEO is deployed, particularly in sectors relying heavily on collaboration platforms such as government, finance, and large enterprises. The stored XSS vulnerability could enable attackers to execute malicious scripts in the browsers of users with access to the platform, potentially leading to session hijacking, unauthorized data access, or lateral movement within the network. Although exploitation requires high privileges and user interaction, the risk remains for insider threats or compromised high-privilege accounts. The vulnerability does not directly affect system availability but can undermine confidentiality and integrity of sensitive communications. Given the collaborative nature of desknet's NEO, exploitation could facilitate broader attacks such as phishing campaigns or malware distribution within an organization. The medium CVSS score reflects a moderate risk, but the potential for targeted attacks against critical infrastructure or sensitive data repositories in Europe elevates the importance of timely mitigation.

Mitigation Recommendations

1. Apply official patches or updates from NEOJAPAN Inc. as soon as they become available to remediate the vulnerability. 2. Restrict high-privilege user accounts to only those necessary and enforce the principle of least privilege to reduce the risk of malicious script injection. 3. Implement strict input validation and sanitization on all user-supplied content within desknet's NEO to prevent injection of malicious scripts. 4. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in users' browsers. 5. Conduct regular security awareness training for users, emphasizing the risks of interacting with untrusted content even within internal platforms. 6. Monitor logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script injections or privilege escalations. 7. Consider network segmentation to isolate critical collaboration platforms and limit the spread of potential attacks. 8. Use web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting desknet's NEO.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-09-01T11:21:42.065Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f0c5669f8a5dbaeac6c235

Added to database: 10/16/2025, 10:13:58 AM

Last enriched: 10/16/2025, 10:29:54 AM

Last updated: 10/16/2025, 1:41:02 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats