Skip to main content

CVE-2025-9646: Cross Site Scripting in O2OA

Medium
VulnerabilityCVE-2025-9646cvecve-2025-9646
Published: Fri Aug 29 2025 (08/29/2025, 13:02:06 UTC)
Source: CVE Database V5
Product: O2OA

Description

A security flaw has been discovered in O2OA up to 10.0-410. This vulnerability affects unknown code of the file /x_organization_assemble_personal/jaxrs/definition/calendarConfig. The manipulation of the argument toMonthViewName results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

AI-Powered Analysis

AILast updated: 08/29/2025, 13:32:56 UTC

Technical Analysis

CVE-2025-9646 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability arises from improper sanitization of the 'toMonthViewName' parameter within the /x_organization_assemble_personal/jaxrs/definition/calendarConfig endpoint. An attacker can remotely manipulate this parameter to inject malicious scripts, which are then executed in the context of the victim's browser. This type of vulnerability enables attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability does not require authentication but does require user interaction (e.g., the victim visiting a crafted URL). The CVSS 4.0 score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality and integrity with no impact on availability. The vendor has acknowledged the issue and plans to fix it in a future release, but no patch is currently available. Public exploit code has been released, increasing the risk of exploitation.

Potential Impact

For European organizations using O2OA up to version 10.0-410, this vulnerability poses a tangible risk of client-side attacks that can compromise user sessions and data confidentiality. Since O2OA is a collaborative office automation platform, exploitation could lead to unauthorized access to sensitive organizational information, phishing attacks leveraging trusted internal domains, and potential lateral movement if session tokens or credentials are stolen. The medium severity rating indicates that while the vulnerability is not critical, it can be leveraged to undermine user trust and data integrity. The remote exploitability without authentication increases the attack surface, especially in organizations with exposed O2OA instances accessible via the internet or intranet. The lack of a current patch means organizations must rely on mitigations until an official fix is released. This vulnerability could disrupt business operations, damage reputation, and lead to compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

European organizations should immediately implement input validation and output encoding controls at the application or web server level to sanitize the 'toMonthViewName' parameter. Web Application Firewalls (WAFs) can be configured with custom rules to detect and block suspicious payloads targeting this parameter. Network segmentation should be enforced to limit access to O2OA instances to trusted internal users only, reducing exposure to external attackers. User awareness training should emphasize caution when clicking on unexpected links, especially those related to calendar or scheduling features. Monitoring and logging of HTTP requests to the affected endpoint should be enhanced to detect exploitation attempts. Organizations should track vendor communications closely and plan for prompt application of the official patch once released. Additionally, consider deploying Content Security Policy (CSP) headers to mitigate the impact of XSS by restricting script execution sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T06:02:55.638Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b1a87cad5a09ad0077e760

Added to database: 8/29/2025, 1:17:48 PM

Last enriched: 8/29/2025, 1:32:56 PM

Last updated: 8/29/2025, 3:28:53 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats