CVE-2025-68935: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ONLYOFFICE Document Server
ONLYOFFICE Docs before 9.2.1 allows XSS via the Font field for the Multilevel list settings window. This is related to DocumentServer.
AI Analysis
Technical Summary
CVE-2025-68935 identifies a Cross-site Scripting (XSS) vulnerability classified under CWE-79 in ONLYOFFICE Document Server versions prior to 9.2.1. The vulnerability specifically exists in the handling of the Font field within the Multilevel list settings window, where user input is not properly sanitized or neutralized before being rendered on a web page. This improper input handling allows an attacker with low privileges (PR:L) to inject malicious JavaScript code that executes in the context of other users’ browsers without requiring any user interaction (UI:N). The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level, with network attack vector (AV:N), low attack complexity (AC:L), partial impact on confidentiality and integrity (C:L/I:L), no impact on availability (A:N), and scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. Exploitation could allow attackers to steal session tokens, manipulate document content, or perform actions on behalf of other users within the Document Server environment. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to organizations using ONLYOFFICE for collaborative document editing, especially where multiple users access the Document Server via browsers. The vulnerability’s presence in a widely used document collaboration platform underscores the importance of timely patching and secure input validation practices.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive document content or user session information, undermining confidentiality and integrity within collaborative environments. Attackers exploiting this XSS flaw could hijack user sessions, inject malicious content into documents, or manipulate user interface elements, potentially facilitating further attacks such as phishing or privilege escalation. Sectors with high reliance on document collaboration platforms, including government agencies, financial institutions, and large enterprises, may face operational disruptions and reputational damage if exploited. Given the scope change in the CVSS vector, the impact could extend beyond the immediate vulnerable component, affecting integrated systems or services relying on ONLYOFFICE Document Server. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. European data protection regulations such as GDPR also heighten the consequences of data breaches resulting from such vulnerabilities.
Mitigation Recommendations
Organizations should immediately upgrade ONLYOFFICE Document Server to version 9.2.1 or later, where this vulnerability is addressed. In addition to patching, implement strict input validation and sanitization on all user-supplied data fields, particularly those related to document formatting and settings. Deploy Content Security Policies (CSP) to restrict the execution of unauthorized scripts within the Document Server web interface. Conduct regular security audits and penetration testing focused on web application input handling. Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Monitor logs for unusual activity related to document editing or font field inputs. Educate users about the risks of XSS and encourage cautious behavior when interacting with document collaboration tools. Finally, consider network segmentation and web application firewalls (WAF) to detect and block malicious payloads targeting the Document Server.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-68935: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ONLYOFFICE Document Server
Description
ONLYOFFICE Docs before 9.2.1 allows XSS via the Font field for the Multilevel list settings window. This is related to DocumentServer.
AI-Powered Analysis
Technical Analysis
CVE-2025-68935 identifies a Cross-site Scripting (XSS) vulnerability classified under CWE-79 in ONLYOFFICE Document Server versions prior to 9.2.1. The vulnerability specifically exists in the handling of the Font field within the Multilevel list settings window, where user input is not properly sanitized or neutralized before being rendered on a web page. This improper input handling allows an attacker with low privileges (PR:L) to inject malicious JavaScript code that executes in the context of other users’ browsers without requiring any user interaction (UI:N). The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level, with network attack vector (AV:N), low attack complexity (AC:L), partial impact on confidentiality and integrity (C:L/I:L), no impact on availability (A:N), and scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. Exploitation could allow attackers to steal session tokens, manipulate document content, or perform actions on behalf of other users within the Document Server environment. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to organizations using ONLYOFFICE for collaborative document editing, especially where multiple users access the Document Server via browsers. The vulnerability’s presence in a widely used document collaboration platform underscores the importance of timely patching and secure input validation practices.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive document content or user session information, undermining confidentiality and integrity within collaborative environments. Attackers exploiting this XSS flaw could hijack user sessions, inject malicious content into documents, or manipulate user interface elements, potentially facilitating further attacks such as phishing or privilege escalation. Sectors with high reliance on document collaboration platforms, including government agencies, financial institutions, and large enterprises, may face operational disruptions and reputational damage if exploited. Given the scope change in the CVSS vector, the impact could extend beyond the immediate vulnerable component, affecting integrated systems or services relying on ONLYOFFICE Document Server. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. European data protection regulations such as GDPR also heighten the consequences of data breaches resulting from such vulnerabilities.
Mitigation Recommendations
Organizations should immediately upgrade ONLYOFFICE Document Server to version 9.2.1 or later, where this vulnerability is addressed. In addition to patching, implement strict input validation and sanitization on all user-supplied data fields, particularly those related to document formatting and settings. Deploy Content Security Policies (CSP) to restrict the execution of unauthorized scripts within the Document Server web interface. Conduct regular security audits and penetration testing focused on web application input handling. Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Monitor logs for unusual activity related to document editing or font field inputs. Educate users about the risks of XSS and encourage cautious behavior when interacting with document collaboration tools. Finally, consider network segmentation and web application firewalls (WAF) to detect and block malicious payloads targeting the Document Server.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-25T20:05:48.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694d9b76ac739891066893e2
Added to database: 12/25/2025, 8:15:50 PM
Last enriched: 12/25/2025, 8:31:11 PM
Last updated: 12/25/2025, 11:37:07 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14913: CWE-862 Missing Authorization in wpshuffle Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin
MediumCVE-2025-15089: Buffer Overflow in UTT 进取 512W
HighCVE-2025-14820
UnknownCVE-2025-14715
UnknownCVE-2025-15088: SQL Injection in ketr JEPaaS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.