CVE-2025-9659: Cross Site Scripting in O2OA
A vulnerability has been found in O2OA up to 10.0-410. The affected element is an unknown function of the file /x_portal_assemble_designer/jaxrs/widget of the component Personal Profile Page. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9659 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the file /x_portal_assemble_designer/jaxrs/widget, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that execute in the context of a victim's browser when they access the affected page. The attack vector is remote and does not require prior authentication, although user interaction is necessary to trigger the script execution. The vulnerability is classified as reflected or stored XSS, enabling attackers to potentially steal session cookies, perform actions on behalf of the user, or deliver further payloads such as malware. The vendor has acknowledged the issue publicly via a GitHub discussion and indicated that a fix will be included in an upcoming version. As of the publication date, no official patch or workaround has been released, and while no exploits have been observed in the wild, the public disclosure increases the risk of exploitation attempts. The CVSS v4.0 score is 5.1 (medium severity), reflecting the moderate impact on confidentiality and integrity, ease of exploitation (low complexity, no privileges required), but limited impact on availability and scope confined to the affected component. The vulnerability does not require user authentication but does require user interaction to trigger the malicious script execution. This vulnerability highlights the importance of input validation and output encoding in web applications, especially in user profile management modules where user-generated content is common.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this XSS vulnerability poses a risk of session hijacking, credential theft, and unauthorized actions performed in the context of legitimate users. This can lead to data breaches involving personal or sensitive information stored or accessible through the affected Personal Profile Page. Organizations in sectors such as government, finance, healthcare, and education—where O2OA might be deployed for collaboration or intranet portals—could face reputational damage, regulatory penalties under GDPR for data exposure, and operational disruptions. The vulnerability could also serve as a foothold for more sophisticated attacks, including lateral movement within internal networks if combined with other exploits. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially given the public disclosure and lack of an immediate patch. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk for organizations with less mature security awareness programs.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Immediately audit and monitor all instances of O2OA for the affected version and restrict access to the Personal Profile Page component where feasible. 2) Implement web application firewall (WAF) rules to detect and block common XSS payloads targeting the /x_portal_assemble_designer/jaxrs/widget endpoint. 3) Conduct user awareness training to reduce the risk of successful social engineering attacks that could trigger the XSS exploit. 4) Apply strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the O2OA platform. 5) Regularly review and sanitize all user inputs and outputs in the affected module, if custom modifications are possible before the official patch is released. 6) Plan and test the deployment of the vendor’s forthcoming patch as soon as it becomes available. 7) Monitor security advisories and threat intelligence feeds for any emerging exploit activity related to CVE-2025-9659 to respond promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9659: Cross Site Scripting in O2OA
Description
A vulnerability has been found in O2OA up to 10.0-410. The affected element is an unknown function of the file /x_portal_assemble_designer/jaxrs/widget of the component Personal Profile Page. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9659 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the file /x_portal_assemble_designer/jaxrs/widget, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that execute in the context of a victim's browser when they access the affected page. The attack vector is remote and does not require prior authentication, although user interaction is necessary to trigger the script execution. The vulnerability is classified as reflected or stored XSS, enabling attackers to potentially steal session cookies, perform actions on behalf of the user, or deliver further payloads such as malware. The vendor has acknowledged the issue publicly via a GitHub discussion and indicated that a fix will be included in an upcoming version. As of the publication date, no official patch or workaround has been released, and while no exploits have been observed in the wild, the public disclosure increases the risk of exploitation attempts. The CVSS v4.0 score is 5.1 (medium severity), reflecting the moderate impact on confidentiality and integrity, ease of exploitation (low complexity, no privileges required), but limited impact on availability and scope confined to the affected component. The vulnerability does not require user authentication but does require user interaction to trigger the malicious script execution. This vulnerability highlights the importance of input validation and output encoding in web applications, especially in user profile management modules where user-generated content is common.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this XSS vulnerability poses a risk of session hijacking, credential theft, and unauthorized actions performed in the context of legitimate users. This can lead to data breaches involving personal or sensitive information stored or accessible through the affected Personal Profile Page. Organizations in sectors such as government, finance, healthcare, and education—where O2OA might be deployed for collaboration or intranet portals—could face reputational damage, regulatory penalties under GDPR for data exposure, and operational disruptions. The vulnerability could also serve as a foothold for more sophisticated attacks, including lateral movement within internal networks if combined with other exploits. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially given the public disclosure and lack of an immediate patch. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk for organizations with less mature security awareness programs.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Immediately audit and monitor all instances of O2OA for the affected version and restrict access to the Personal Profile Page component where feasible. 2) Implement web application firewall (WAF) rules to detect and block common XSS payloads targeting the /x_portal_assemble_designer/jaxrs/widget endpoint. 3) Conduct user awareness training to reduce the risk of successful social engineering attacks that could trigger the XSS exploit. 4) Apply strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the O2OA platform. 5) Regularly review and sanitize all user inputs and outputs in the affected module, if custom modifications are possible before the official patch is released. 6) Plan and test the deployment of the vendor’s forthcoming patch as soon as it becomes available. 7) Monitor security advisories and threat intelligence feeds for any emerging exploit activity related to CVE-2025-9659 to respond promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T07:11:22.718Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b1d2aead5a09ad00795e6e
Added to database: 8/29/2025, 4:17:50 PM
Last enriched: 8/29/2025, 4:32:45 PM
Last updated: 8/29/2025, 5:52:52 PM
Views: 3
Related Threats
CVE-2025-9673: Improper Export of Android Application Components in Kakao 헤이카카오 Hey Kakao App
MediumCVE-2025-9672: Improper Export of Android Application Components in Rejseplanen App
MediumCVE-2025-9671: Improper Export of Android Application Components in UAB Paytend App
MediumCVE-2025-56577: n/a
HighCVE-2025-9670: Inefficient Regular Expression Complexity in mixmark-io turndown
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.