CVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
CVE-2025-55072 is a stored cross-site scripting (XSS) vulnerability affecting desknet's NEO versions V2. 0R1. 0 through V9. 0R2. 0. This flaw allows an authenticated user with limited privileges to inject arbitrary JavaScript code that executes in the browsers of other users. The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions within the application context. Exploitation requires user interaction and some level of authentication but can lead to a complete compromise of user sessions. No known exploits are currently active in the wild. The vulnerability has a medium severity with a CVSS score of 5.
AI Analysis
Technical Summary
CVE-2025-55072 is a stored cross-site scripting (XSS) vulnerability identified in desknet's NEO, a groupware product developed by NEOJAPAN Inc., affecting versions from V2.0R1.0 up to V9.0R2.0. Stored XSS occurs when malicious input is saved by the application and later rendered in a web page without proper sanitization, allowing arbitrary JavaScript execution in the context of other users' browsers. This vulnerability requires an attacker to have some level of authenticated access (PR:L) and user interaction (UI:R) to trigger the exploit. The vulnerability has a CVSS 3.0 base score of 5.4, indicating medium severity. The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely over the network. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users. The impact affects confidentiality and integrity (C:L/I:L), but not availability. Exploitation could lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim user. No public exploits are known at this time, but the vulnerability is published and should be addressed proactively. The lack of available patches at the time of disclosure suggests that organizations must implement interim mitigations such as input validation and output encoding. Given the product's use in collaborative environments, the risk of lateral movement and data leakage is significant if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-55072 can be substantial, especially in sectors relying on desknet's NEO for internal communication and collaboration, such as government agencies, educational institutions, and enterprises. Exploitation could lead to unauthorized access to sensitive information, including internal documents, emails, and user credentials. This can result in data breaches, loss of intellectual property, and reputational damage. The vulnerability's ability to execute arbitrary JavaScript in users' browsers could facilitate phishing attacks, session hijacking, or deployment of further malware within the corporate network. Since desknet's NEO is often used in multi-user environments, the risk of lateral movement and privilege escalation increases, potentially compromising broader organizational assets. The medium severity score reflects that while exploitation requires some authentication and user interaction, the consequences can still disrupt confidentiality and integrity of critical business processes. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal data is exposed due to this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-55072, organizations should first verify if patches or updates are available from NEOJAPAN Inc. and apply them promptly. In the absence of official patches, implement strict input validation on all user-supplied data to prevent injection of malicious scripts. Employ robust output encoding/escaping techniques on all data rendered in the web interface to neutralize any embedded scripts. Restrict user privileges to the minimum necessary to reduce the risk of malicious input from less trusted users. Enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Conduct regular security awareness training to educate users about the risks of interacting with suspicious content. Monitor application logs for unusual activities that may indicate attempted exploitation. Consider deploying web application firewalls (WAF) with rules tailored to detect and block XSS payloads targeting desknet's NEO. Finally, isolate the desknet's NEO environment within segmented network zones to limit potential lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
Description
CVE-2025-55072 is a stored cross-site scripting (XSS) vulnerability affecting desknet's NEO versions V2. 0R1. 0 through V9. 0R2. 0. This flaw allows an authenticated user with limited privileges to inject arbitrary JavaScript code that executes in the browsers of other users. The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions within the application context. Exploitation requires user interaction and some level of authentication but can lead to a complete compromise of user sessions. No known exploits are currently active in the wild. The vulnerability has a medium severity with a CVSS score of 5.
AI-Powered Analysis
Technical Analysis
CVE-2025-55072 is a stored cross-site scripting (XSS) vulnerability identified in desknet's NEO, a groupware product developed by NEOJAPAN Inc., affecting versions from V2.0R1.0 up to V9.0R2.0. Stored XSS occurs when malicious input is saved by the application and later rendered in a web page without proper sanitization, allowing arbitrary JavaScript execution in the context of other users' browsers. This vulnerability requires an attacker to have some level of authenticated access (PR:L) and user interaction (UI:R) to trigger the exploit. The vulnerability has a CVSS 3.0 base score of 5.4, indicating medium severity. The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely over the network. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users. The impact affects confidentiality and integrity (C:L/I:L), but not availability. Exploitation could lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim user. No public exploits are known at this time, but the vulnerability is published and should be addressed proactively. The lack of available patches at the time of disclosure suggests that organizations must implement interim mitigations such as input validation and output encoding. Given the product's use in collaborative environments, the risk of lateral movement and data leakage is significant if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-55072 can be substantial, especially in sectors relying on desknet's NEO for internal communication and collaboration, such as government agencies, educational institutions, and enterprises. Exploitation could lead to unauthorized access to sensitive information, including internal documents, emails, and user credentials. This can result in data breaches, loss of intellectual property, and reputational damage. The vulnerability's ability to execute arbitrary JavaScript in users' browsers could facilitate phishing attacks, session hijacking, or deployment of further malware within the corporate network. Since desknet's NEO is often used in multi-user environments, the risk of lateral movement and privilege escalation increases, potentially compromising broader organizational assets. The medium severity score reflects that while exploitation requires some authentication and user interaction, the consequences can still disrupt confidentiality and integrity of critical business processes. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal data is exposed due to this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-55072, organizations should first verify if patches or updates are available from NEOJAPAN Inc. and apply them promptly. In the absence of official patches, implement strict input validation on all user-supplied data to prevent injection of malicious scripts. Employ robust output encoding/escaping techniques on all data rendered in the web interface to neutralize any embedded scripts. Restrict user privileges to the minimum necessary to reduce the risk of malicious input from less trusted users. Enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Conduct regular security awareness training to educate users about the risks of interacting with suspicious content. Monitor application logs for unusual activities that may indicate attempted exploitation. Consider deploying web application firewalls (WAF) with rules tailored to detect and block XSS payloads targeting desknet's NEO. Finally, isolate the desknet's NEO environment within segmented network zones to limit potential lateral movement in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-09-01T11:21:43.901Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68f0c5669f8a5dbaeac6c239
Added to database: 10/16/2025, 10:13:58 AM
Last enriched: 10/16/2025, 10:29:31 AM
Last updated: 10/16/2025, 1:40:58 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9804: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
CriticalCVE-2025-9152: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.