Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68935: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ONLYOFFICE Document Server

0
Medium
VulnerabilityCVE-2025-68935cvecve-2025-68935cwe-79
Published: Thu Dec 25 2025 (12/25/2025, 20:05:48 UTC)
Source: CVE Database V5
Vendor/Project: ONLYOFFICE
Product: Document Server

Description

CVE-2025-68935 is a medium severity cross-site scripting (XSS) vulnerability in ONLYOFFICE Document Server versions before 9. 2. 1. The flaw arises from improper input neutralization in the Font field of the Multilevel list settings window, allowing an attacker with low privileges to inject malicious scripts without user interaction. Exploitation can lead to partial compromise of confidentiality and integrity, with no direct impact on availability. The vulnerability affects web-based document collaboration environments and could be leveraged for session hijacking or data theft. No known exploits are currently reported in the wild. European organizations using ONLYOFFICE Document Server should prioritize patching once updates are available and implement strict input validation and content security policies. Countries with higher adoption of ONLYOFFICE, such as Germany, France, and the UK, are more likely to be impacted. Given the CVSS score of 6.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:41:47 UTC

Technical Analysis

CVE-2025-68935 is a cross-site scripting (XSS) vulnerability identified in ONLYOFFICE Document Server versions prior to 9.2.1. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the issue exists in the Font field within the Multilevel list settings window of the Document Server interface. An attacker with low privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N). The vulnerability allows injection of malicious scripts that execute in the context of the victim's browser session, potentially leading to unauthorized access to sensitive information or manipulation of document content. The CVSS 3.1 vector indicates a scope change (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Although no known exploits are reported in the wild, the vulnerability poses a risk in collaborative document environments where ONLYOFFICE is deployed. The lack of a patch link suggests that a fix may be forthcoming or pending release. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those handling rich document editing features.

Potential Impact

For European organizations, the exploitation of this XSS vulnerability could lead to unauthorized disclosure of sensitive document data and potential manipulation of document content, undermining trust in collaborative workflows. Confidentiality impact is limited but significant in environments handling sensitive or regulated information, such as legal, financial, or governmental sectors. Integrity loss could result in altered documents without detection, affecting decision-making and compliance. Since the vulnerability requires low privileges but no user interaction, attackers who gain limited access to the Document Server interface could escalate their impact. The absence of availability impact reduces the risk of service disruption but does not diminish the threat to data security. Organizations relying on ONLYOFFICE Document Server for internal or external collaboration are at risk, especially if the server is internet-facing or accessible by multiple users. The medium severity rating suggests prioritization in patch management cycles, particularly in sectors with strict data protection regulations like GDPR.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor ONLYOFFICE vendor communications closely and apply the security update to version 9.2.1 or later immediately upon release. 2) Until patched, restrict access to the Document Server interface to trusted users and networks, employing network segmentation and VPNs where possible. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the Font field or multilevel list settings. 4) Enforce Content Security Policy (CSP) headers to limit script execution sources and reduce XSS impact. 5) Conduct regular security audits and penetration tests focusing on input validation and output encoding in document management systems. 6) Educate users and administrators about the risks of XSS and encourage vigilance for unusual document behavior or interface anomalies. 7) Review and harden authentication and authorization controls to minimize the risk of low-privilege account compromise. 8) Log and monitor Document Server access and input fields for anomalous activity indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-25T20:05:48.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694d9b76ac739891066893e2

Added to database: 12/25/2025, 8:15:50 PM

Last enriched: 1/1/2026, 10:41:47 PM

Last updated: 2/6/2026, 8:51:12 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats