Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO

0
Medium
VulnerabilityCVE-2025-55072cvecve-2025-55072
Published: Thu Oct 16 2025 (10/16/2025, 10:03:29 UTC)
Source: CVE Database V5
Vendor/Project: NEOJAPAN Inc.
Product: desknet's NEO

Description

CVE-2025-55072 is a stored cross-site scripting (XSS) vulnerability affecting desknet's NEO versions V2. 0R1. 0 through V9. 0R2. 0. This flaw allows an authenticated user with limited privileges to inject arbitrary JavaScript code that executes in the browsers of other users. The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions within the application context. Exploitation requires user interaction and some level of authentication but can lead to a complete compromise of user sessions. No known exploits are currently active in the wild. The vulnerability has a medium severity with a CVSS score of 5.

AI-Powered Analysis

AILast updated: 10/16/2025, 10:29:31 UTC

Technical Analysis

CVE-2025-55072 is a stored cross-site scripting (XSS) vulnerability identified in desknet's NEO, a groupware product developed by NEOJAPAN Inc., affecting versions from V2.0R1.0 up to V9.0R2.0. Stored XSS occurs when malicious input is saved by the application and later rendered in a web page without proper sanitization, allowing arbitrary JavaScript execution in the context of other users' browsers. This vulnerability requires an attacker to have some level of authenticated access (PR:L) and user interaction (UI:R) to trigger the exploit. The vulnerability has a CVSS 3.0 base score of 5.4, indicating medium severity. The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely over the network. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users. The impact affects confidentiality and integrity (C:L/I:L), but not availability. Exploitation could lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim user. No public exploits are known at this time, but the vulnerability is published and should be addressed proactively. The lack of available patches at the time of disclosure suggests that organizations must implement interim mitigations such as input validation and output encoding. Given the product's use in collaborative environments, the risk of lateral movement and data leakage is significant if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-55072 can be substantial, especially in sectors relying on desknet's NEO for internal communication and collaboration, such as government agencies, educational institutions, and enterprises. Exploitation could lead to unauthorized access to sensitive information, including internal documents, emails, and user credentials. This can result in data breaches, loss of intellectual property, and reputational damage. The vulnerability's ability to execute arbitrary JavaScript in users' browsers could facilitate phishing attacks, session hijacking, or deployment of further malware within the corporate network. Since desknet's NEO is often used in multi-user environments, the risk of lateral movement and privilege escalation increases, potentially compromising broader organizational assets. The medium severity score reflects that while exploitation requires some authentication and user interaction, the consequences can still disrupt confidentiality and integrity of critical business processes. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal data is exposed due to this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-55072, organizations should first verify if patches or updates are available from NEOJAPAN Inc. and apply them promptly. In the absence of official patches, implement strict input validation on all user-supplied data to prevent injection of malicious scripts. Employ robust output encoding/escaping techniques on all data rendered in the web interface to neutralize any embedded scripts. Restrict user privileges to the minimum necessary to reduce the risk of malicious input from less trusted users. Enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Conduct regular security awareness training to educate users about the risks of interacting with suspicious content. Monitor application logs for unusual activities that may indicate attempted exploitation. Consider deploying web application firewalls (WAF) with rules tailored to detect and block XSS payloads targeting desknet's NEO. Finally, isolate the desknet's NEO environment within segmented network zones to limit potential lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-09-01T11:21:43.901Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f0c5669f8a5dbaeac6c239

Added to database: 10/16/2025, 10:13:58 AM

Last enriched: 10/16/2025, 10:29:31 AM

Last updated: 10/16/2025, 1:40:58 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats