CVE-2025-68935: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ONLYOFFICE Document Server
CVE-2025-68935 is a medium severity cross-site scripting (XSS) vulnerability in ONLYOFFICE Document Server versions before 9. 2. 1. The flaw arises from improper input neutralization in the Font field of the Multilevel list settings window, allowing an attacker with low privileges to inject malicious scripts without user interaction. Exploitation can lead to partial compromise of confidentiality and integrity, with no direct impact on availability. The vulnerability affects web-based document collaboration environments and could be leveraged for session hijacking or data theft. No known exploits are currently reported in the wild. European organizations using ONLYOFFICE Document Server should prioritize patching once updates are available and implement strict input validation and content security policies. Countries with higher adoption of ONLYOFFICE, such as Germany, France, and the UK, are more likely to be impacted. Given the CVSS score of 6.
AI Analysis
Technical Summary
CVE-2025-68935 is a cross-site scripting (XSS) vulnerability identified in ONLYOFFICE Document Server versions prior to 9.2.1. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the issue exists in the Font field within the Multilevel list settings window of the Document Server interface. An attacker with low privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N). The vulnerability allows injection of malicious scripts that execute in the context of the victim's browser session, potentially leading to unauthorized access to sensitive information or manipulation of document content. The CVSS 3.1 vector indicates a scope change (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Although no known exploits are reported in the wild, the vulnerability poses a risk in collaborative document environments where ONLYOFFICE is deployed. The lack of a patch link suggests that a fix may be forthcoming or pending release. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those handling rich document editing features.
Potential Impact
For European organizations, the exploitation of this XSS vulnerability could lead to unauthorized disclosure of sensitive document data and potential manipulation of document content, undermining trust in collaborative workflows. Confidentiality impact is limited but significant in environments handling sensitive or regulated information, such as legal, financial, or governmental sectors. Integrity loss could result in altered documents without detection, affecting decision-making and compliance. Since the vulnerability requires low privileges but no user interaction, attackers who gain limited access to the Document Server interface could escalate their impact. The absence of availability impact reduces the risk of service disruption but does not diminish the threat to data security. Organizations relying on ONLYOFFICE Document Server for internal or external collaboration are at risk, especially if the server is internet-facing or accessible by multiple users. The medium severity rating suggests prioritization in patch management cycles, particularly in sectors with strict data protection regulations like GDPR.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor ONLYOFFICE vendor communications closely and apply the security update to version 9.2.1 or later immediately upon release. 2) Until patched, restrict access to the Document Server interface to trusted users and networks, employing network segmentation and VPNs where possible. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the Font field or multilevel list settings. 4) Enforce Content Security Policy (CSP) headers to limit script execution sources and reduce XSS impact. 5) Conduct regular security audits and penetration tests focusing on input validation and output encoding in document management systems. 6) Educate users and administrators about the risks of XSS and encourage vigilance for unusual document behavior or interface anomalies. 7) Review and harden authentication and authorization controls to minimize the risk of low-privilege account compromise. 8) Log and monitor Document Server access and input fields for anomalous activity indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-68935: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ONLYOFFICE Document Server
Description
CVE-2025-68935 is a medium severity cross-site scripting (XSS) vulnerability in ONLYOFFICE Document Server versions before 9. 2. 1. The flaw arises from improper input neutralization in the Font field of the Multilevel list settings window, allowing an attacker with low privileges to inject malicious scripts without user interaction. Exploitation can lead to partial compromise of confidentiality and integrity, with no direct impact on availability. The vulnerability affects web-based document collaboration environments and could be leveraged for session hijacking or data theft. No known exploits are currently reported in the wild. European organizations using ONLYOFFICE Document Server should prioritize patching once updates are available and implement strict input validation and content security policies. Countries with higher adoption of ONLYOFFICE, such as Germany, France, and the UK, are more likely to be impacted. Given the CVSS score of 6.
AI-Powered Analysis
Technical Analysis
CVE-2025-68935 is a cross-site scripting (XSS) vulnerability identified in ONLYOFFICE Document Server versions prior to 9.2.1. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the issue exists in the Font field within the Multilevel list settings window of the Document Server interface. An attacker with low privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N). The vulnerability allows injection of malicious scripts that execute in the context of the victim's browser session, potentially leading to unauthorized access to sensitive information or manipulation of document content. The CVSS 3.1 vector indicates a scope change (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Although no known exploits are reported in the wild, the vulnerability poses a risk in collaborative document environments where ONLYOFFICE is deployed. The lack of a patch link suggests that a fix may be forthcoming or pending release. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those handling rich document editing features.
Potential Impact
For European organizations, the exploitation of this XSS vulnerability could lead to unauthorized disclosure of sensitive document data and potential manipulation of document content, undermining trust in collaborative workflows. Confidentiality impact is limited but significant in environments handling sensitive or regulated information, such as legal, financial, or governmental sectors. Integrity loss could result in altered documents without detection, affecting decision-making and compliance. Since the vulnerability requires low privileges but no user interaction, attackers who gain limited access to the Document Server interface could escalate their impact. The absence of availability impact reduces the risk of service disruption but does not diminish the threat to data security. Organizations relying on ONLYOFFICE Document Server for internal or external collaboration are at risk, especially if the server is internet-facing or accessible by multiple users. The medium severity rating suggests prioritization in patch management cycles, particularly in sectors with strict data protection regulations like GDPR.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor ONLYOFFICE vendor communications closely and apply the security update to version 9.2.1 or later immediately upon release. 2) Until patched, restrict access to the Document Server interface to trusted users and networks, employing network segmentation and VPNs where possible. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the Font field or multilevel list settings. 4) Enforce Content Security Policy (CSP) headers to limit script execution sources and reduce XSS impact. 5) Conduct regular security audits and penetration tests focusing on input validation and output encoding in document management systems. 6) Educate users and administrators about the risks of XSS and encourage vigilance for unusual document behavior or interface anomalies. 7) Review and harden authentication and authorization controls to minimize the risk of low-privilege account compromise. 8) Log and monitor Document Server access and input fields for anomalous activity indicative of exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-25T20:05:48.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694d9b76ac739891066893e2
Added to database: 12/25/2025, 8:15:50 PM
Last enriched: 1/1/2026, 10:41:47 PM
Last updated: 2/6/2026, 8:51:12 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
MediumAISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
MediumCVE-2026-2011: SQL Injection in itsourcecode Student Management System
MediumCVE-2026-24930: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
HighCVE-2026-24929: CWE-476 NULL Pointer Dereference in Huawei HarmonyOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.