CVE-2025-9658: Cross Site Scripting in O2OA
A flaw has been found in O2OA up to 10.0-410. Impacted is an unknown function of the file /x_portal_assemble_designer/jaxrs/dict/ of the component Personal Profile Page. This manipulation of the argument name/alias/description causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9658 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the /x_portal_assemble_designer/jaxrs/dict/ path of the Personal Profile Page component. The flaw arises from improper sanitization or validation of user-controllable input parameters such as name, alias, or description. An attacker can manipulate these parameters to inject malicious scripts, which are then executed in the context of the victim's browser. This type of vulnerability enables attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability is remotely exploitable without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., visiting a crafted URL). The vendor has acknowledged the issue and indicated that a fix will be included in a forthcoming version, but as of the publication date, no patch is available. The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality and integrity. No known exploits are currently observed in the wild, but proof-of-concept code has been published, increasing the risk of exploitation.
Potential Impact
For European organizations using O2OA, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Successful exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially leading to credential theft, unauthorized actions performed on behalf of users, or distribution of malware. Organizations that rely on O2OA for internal collaboration or personal profile management may experience reputational damage, data leakage, or disruption of user trust. Since exploitation requires user interaction, phishing or social engineering campaigns could be leveraged to increase attack success. The impact is particularly relevant for sectors with sensitive personal or corporate information, such as finance, healthcare, and government institutions within Europe. Additionally, the lack of an immediate patch means organizations must rely on interim mitigations, increasing exposure time. However, the medium severity and limited scope of impact suggest that while the threat is significant, it is not critical, but should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
European organizations should implement several targeted mitigations to reduce risk until an official patch is released. First, apply strict input validation and output encoding on all user-supplied data within O2OA, especially for parameters like name, alias, and description, to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Educate users to recognize and avoid suspicious links or messages that could trigger XSS attacks. Monitor web application logs for unusual requests targeting the vulnerable endpoints. If feasible, restrict access to the affected Personal Profile Page component to trusted internal networks or authenticated users only, reducing exposure. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the specific vulnerable parameters. Finally, maintain close communication with the vendor for timely updates and apply the official patch immediately upon release to fully remediate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9658: Cross Site Scripting in O2OA
Description
A flaw has been found in O2OA up to 10.0-410. Impacted is an unknown function of the file /x_portal_assemble_designer/jaxrs/dict/ of the component Personal Profile Page. This manipulation of the argument name/alias/description causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9658 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the /x_portal_assemble_designer/jaxrs/dict/ path of the Personal Profile Page component. The flaw arises from improper sanitization or validation of user-controllable input parameters such as name, alias, or description. An attacker can manipulate these parameters to inject malicious scripts, which are then executed in the context of the victim's browser. This type of vulnerability enables attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability is remotely exploitable without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., visiting a crafted URL). The vendor has acknowledged the issue and indicated that a fix will be included in a forthcoming version, but as of the publication date, no patch is available. The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality and integrity. No known exploits are currently observed in the wild, but proof-of-concept code has been published, increasing the risk of exploitation.
Potential Impact
For European organizations using O2OA, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Successful exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially leading to credential theft, unauthorized actions performed on behalf of users, or distribution of malware. Organizations that rely on O2OA for internal collaboration or personal profile management may experience reputational damage, data leakage, or disruption of user trust. Since exploitation requires user interaction, phishing or social engineering campaigns could be leveraged to increase attack success. The impact is particularly relevant for sectors with sensitive personal or corporate information, such as finance, healthcare, and government institutions within Europe. Additionally, the lack of an immediate patch means organizations must rely on interim mitigations, increasing exposure time. However, the medium severity and limited scope of impact suggest that while the threat is significant, it is not critical, but should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
European organizations should implement several targeted mitigations to reduce risk until an official patch is released. First, apply strict input validation and output encoding on all user-supplied data within O2OA, especially for parameters like name, alias, and description, to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Educate users to recognize and avoid suspicious links or messages that could trigger XSS attacks. Monitor web application logs for unusual requests targeting the vulnerable endpoints. If feasible, restrict access to the affected Personal Profile Page component to trusted internal networks or authenticated users only, reducing exposure. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the specific vulnerable parameters. Finally, maintain close communication with the vendor for timely updates and apply the official patch immediately upon release to fully remediate the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T07:11:19.892Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b1d2aead5a09ad00795e66
Added to database: 8/29/2025, 4:17:50 PM
Last enriched: 8/29/2025, 4:32:57 PM
Last updated: 8/29/2025, 5:53:04 PM
Views: 4
Related Threats
CVE-2025-9671: Improper Export of Android Application Components in UAB Paytend App
MediumCVE-2025-56577: n/a
HighCVE-2025-9670: Inefficient Regular Expression Complexity in mixmark-io turndown
MediumCVE-2025-9669: SQL Injection in Jinher OA
MediumCVE-2025-43773: CWE-862 Missing Authorization in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.