CVE-2025-9680: Cross Site Scripting in O2OA
A vulnerability was detected in O2OA up to 10.0-410. This impacts an unknown function of the file /x_portal_assemble_designer/jaxrs/page of the component Personal Profile Page. Performing manipulation results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9680 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the /x_portal_assemble_designer/jaxrs/page endpoint of the Personal Profile Page component. An attacker can exploit this flaw by crafting malicious input that is improperly sanitized or encoded, allowing the injection of arbitrary scripts into the web application. Because the vulnerability is remotely exploitable without authentication, an attacker can initiate the attack over the network without needing valid credentials. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of exploitation (low attack complexity, no privileges required) but limited impact on confidentiality and availability, with some impact on integrity and requiring user interaction (victim must visit a maliciously crafted page). The vendor has acknowledged the issue and plans to fix it in a future release, but no patch is currently available. Public exploit code has been released, increasing the risk of exploitation. XSS vulnerabilities like this can be leveraged to steal session cookies, perform actions on behalf of users, or deliver further malicious payloads, potentially leading to account compromise or data leakage within the affected application environment.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a tangible risk to the confidentiality and integrity of user data. Since O2OA is a collaborative office automation platform, exploitation could allow attackers to hijack user sessions, manipulate personal profile data, or conduct phishing attacks within the trusted application context. This could lead to unauthorized access to sensitive corporate information, disruption of internal workflows, or reputational damage. The medium severity score indicates that while the vulnerability is not critical, it still represents a meaningful threat, especially in environments where O2OA is integrated with other critical systems or contains sensitive user information. The lack of a current patch and the availability of public exploits increase the urgency for European organizations to address this vulnerability promptly. Additionally, the requirement for user interaction means that social engineering or phishing campaigns could be used to trigger the exploit, increasing the attack surface.
Mitigation Recommendations
European organizations should take immediate steps to mitigate the risk posed by CVE-2025-9680 beyond waiting for the vendor patch. Specific recommendations include: 1) Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the /x_portal_assemble_designer/jaxrs/page endpoint. 3) Conduct thorough input validation and output encoding on all user-supplied data within O2OA, especially in the Personal Profile Page component, if customization or source access is available. 4) Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the application to reduce successful exploitation via social engineering. 5) Monitor application logs and network traffic for unusual activity indicative of exploitation attempts. 6) Plan and prioritize upgrading to the vendor’s patched version once released, and test updates in a controlled environment before deployment. 7) Consider isolating or limiting access to the vulnerable O2OA instance to trusted networks or VPNs to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9680: Cross Site Scripting in O2OA
Description
A vulnerability was detected in O2OA up to 10.0-410. This impacts an unknown function of the file /x_portal_assemble_designer/jaxrs/page of the component Personal Profile Page. Performing manipulation results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9680 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the /x_portal_assemble_designer/jaxrs/page endpoint of the Personal Profile Page component. An attacker can exploit this flaw by crafting malicious input that is improperly sanitized or encoded, allowing the injection of arbitrary scripts into the web application. Because the vulnerability is remotely exploitable without authentication, an attacker can initiate the attack over the network without needing valid credentials. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of exploitation (low attack complexity, no privileges required) but limited impact on confidentiality and availability, with some impact on integrity and requiring user interaction (victim must visit a maliciously crafted page). The vendor has acknowledged the issue and plans to fix it in a future release, but no patch is currently available. Public exploit code has been released, increasing the risk of exploitation. XSS vulnerabilities like this can be leveraged to steal session cookies, perform actions on behalf of users, or deliver further malicious payloads, potentially leading to account compromise or data leakage within the affected application environment.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a tangible risk to the confidentiality and integrity of user data. Since O2OA is a collaborative office automation platform, exploitation could allow attackers to hijack user sessions, manipulate personal profile data, or conduct phishing attacks within the trusted application context. This could lead to unauthorized access to sensitive corporate information, disruption of internal workflows, or reputational damage. The medium severity score indicates that while the vulnerability is not critical, it still represents a meaningful threat, especially in environments where O2OA is integrated with other critical systems or contains sensitive user information. The lack of a current patch and the availability of public exploits increase the urgency for European organizations to address this vulnerability promptly. Additionally, the requirement for user interaction means that social engineering or phishing campaigns could be used to trigger the exploit, increasing the attack surface.
Mitigation Recommendations
European organizations should take immediate steps to mitigate the risk posed by CVE-2025-9680 beyond waiting for the vendor patch. Specific recommendations include: 1) Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the /x_portal_assemble_designer/jaxrs/page endpoint. 3) Conduct thorough input validation and output encoding on all user-supplied data within O2OA, especially in the Personal Profile Page component, if customization or source access is available. 4) Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the application to reduce successful exploitation via social engineering. 5) Monitor application logs and network traffic for unusual activity indicative of exploitation attempts. 6) Plan and prioritize upgrading to the vendor’s patched version once released, and test updates in a controlled environment before deployment. 7) Consider isolating or limiting access to the vulnerable O2OA instance to trusted networks or VPNs to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T10:49:31.149Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b2a5a1ad5a09ad007ff3b2
Added to database: 8/30/2025, 7:17:53 AM
Last enriched: 8/30/2025, 7:32:47 AM
Last updated: 8/30/2025, 9:44:45 AM
Views: 5
Related Threats
CVE-2025-9683: Cross Site Scripting in O2OA
MediumCVE-2025-9682: Cross Site Scripting in O2OA
MediumCVE-2025-9681: Cross Site Scripting in O2OA
MediumCVE-2025-9679: SQL Injection in itsourcecode Student Information System
MediumCVE-2025-9500: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tobiasbg TablePress – Tables in WordPress made easy
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.