Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63737: n/a

0
Medium
VulnerabilityCVE-2025-63737cvecve-2025-63737
Published: Tue Dec 09 2025 (12/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross-site scripting (XSS) vulnerability in function urltestAction in file cliAction.php in Xinhu Rainrock RockOA 2.7.0 allows remote attackers to inject arbitrary web script or HTML via the m parameter to the task.php endpoint.

AI-Powered Analysis

AILast updated: 12/09/2025, 17:16:02 UTC

Technical Analysis

CVE-2025-63737 is a cross-site scripting (XSS) vulnerability identified in the Xinhu Rainrock RockOA 2.7.0 application, specifically within the urltestAction function located in the cliAction.php file. The vulnerability arises because the application fails to properly sanitize or encode user-supplied input passed through the 'm' parameter in HTTP requests to the task.php endpoint. This allows remote attackers to inject arbitrary JavaScript or HTML code, which is then executed in the context of the victim's browser when they access the affected page. The lack of authentication requirements means any remote attacker can exploit this flaw without needing valid credentials. The vulnerability could be leveraged to perform session hijacking, steal cookies, conduct phishing attacks, or manipulate the user interface to mislead users. Although no public exploits or patches are currently available, the vulnerability is publicly disclosed and assigned a CVE identifier, indicating it is recognized and should be addressed promptly. The absence of a CVSS score limits precise severity quantification, but the nature of XSS vulnerabilities and the attack vector suggest a significant risk. The vulnerability affects version 2.7.0 of RockOA, a web-based office automation platform used in various organizational environments. The attack vector involves crafting malicious URLs that include the payload in the 'm' parameter, which when accessed by users, triggers the malicious script execution. This can compromise user data confidentiality and integrity and potentially impact availability if used to inject disruptive scripts.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality and integrity of user sessions and data. Exploitation could lead to unauthorized access to sensitive information, session hijacking, and distribution of malware or phishing content through trusted interfaces. Organizations relying on RockOA 2.7.0 for internal communications or workflow management may experience operational disruptions and reputational damage if attackers leverage this flaw. The vulnerability's ease of exploitation without authentication increases the attack surface, especially for organizations with externally accessible RockOA instances. Given the potential for widespread impact on user trust and data security, European entities using this software must prioritize remediation. Additionally, sectors with stringent data protection requirements, such as finance, healthcare, and government, could face regulatory consequences if exploited. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'm' parameter within the task.php endpoint to neutralize malicious scripts. Web application firewalls (WAFs) can be configured to detect and block suspicious payloads targeting this parameter. Restricting access to the task.php endpoint to trusted internal networks or via VPN can reduce exposure. Monitoring web logs for unusual or repeated requests containing script tags or suspicious characters in the 'm' parameter can help detect exploitation attempts. Organizations should engage with the vendor or community to obtain patches or updates addressing this vulnerability and apply them promptly once available. In the interim, consider disabling or restricting the vulnerable functionality if feasible. User awareness training on recognizing phishing or suspicious links can reduce the impact of successful XSS attacks. Finally, conducting regular security assessments and penetration tests on RockOA deployments will help identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693856d07515e08d316631dc

Added to database: 12/9/2025, 5:05:20 PM

Last enriched: 12/9/2025, 5:16:02 PM

Last updated: 12/11/2025, 12:07:58 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats