CVE-2025-9681: Cross Site Scripting in O2OA
A flaw has been found in O2OA up to 10.0-410. Affected is an unknown function of the file /x_program_center/jaxrs/agent of the component Personal Profile Page. Executing manipulation can lead to cross site scripting. The attack can be launched remotely. The exploit has been published and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9681 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the /x_program_center/jaxrs/agent file, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that execute in the context of a victim's browser when they visit the affected page. The attack vector is remote, requiring no prior authentication, but does require some user interaction (such as visiting a crafted URL or interacting with manipulated content). The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The CVSS vector details indicate that the attack is network accessible (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some user interaction (UI:P), and impacts confidentiality and integrity to a limited extent (VI:L), without affecting availability. The vendor has acknowledged the issue and plans to fix it in a future release, but no patch is currently available. Although no known exploits are reported in the wild, proof-of-concept code has been published, increasing the risk of exploitation. XSS vulnerabilities like this can be leveraged for session hijacking, phishing, or delivering further malware, especially in web applications handling sensitive user data.
Potential Impact
For European organizations using O2OA, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Since the affected component is the Personal Profile Page, attackers could potentially steal session cookies, impersonate users, or manipulate displayed content to deceive users. This can lead to unauthorized access to personal information or internal resources if session tokens are compromised. The medium severity suggests that while the impact is not catastrophic, it can facilitate further attacks or data leakage. Organizations in sectors such as government, finance, healthcare, and enterprises relying on O2OA for collaboration or personal data management could face reputational damage, regulatory scrutiny under GDPR for data breaches, and operational disruptions. The requirement for user interaction means social engineering or phishing campaigns could be used to exploit this vulnerability, increasing the attack surface. The lack of an immediate patch necessitates interim mitigations to reduce risk.
Mitigation Recommendations
European organizations should implement several specific measures beyond generic advice: 1) Apply strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the vulnerable endpoint (/x_program_center/jaxrs/agent). 3) Conduct thorough input validation and output encoding on all user-supplied data within the Personal Profile Page, especially if customizations or extensions are in place. 4) Educate users about the risks of clicking unknown or suspicious links, as exploitation requires user interaction. 5) Monitor web server and application logs for unusual requests or patterns indicative of exploitation attempts. 6) Plan for timely upgrade to the fixed version once the vendor releases a patch. 7) If feasible, restrict access to the affected component through network segmentation or access controls to limit exposure. 8) Implement multi-factor authentication (MFA) to reduce the impact of stolen session tokens.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-9681: Cross Site Scripting in O2OA
Description
A flaw has been found in O2OA up to 10.0-410. Affected is an unknown function of the file /x_program_center/jaxrs/agent of the component Personal Profile Page. Executing manipulation can lead to cross site scripting. The attack can be launched remotely. The exploit has been published and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9681 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the /x_program_center/jaxrs/agent file, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that execute in the context of a victim's browser when they visit the affected page. The attack vector is remote, requiring no prior authentication, but does require some user interaction (such as visiting a crafted URL or interacting with manipulated content). The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The CVSS vector details indicate that the attack is network accessible (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some user interaction (UI:P), and impacts confidentiality and integrity to a limited extent (VI:L), without affecting availability. The vendor has acknowledged the issue and plans to fix it in a future release, but no patch is currently available. Although no known exploits are reported in the wild, proof-of-concept code has been published, increasing the risk of exploitation. XSS vulnerabilities like this can be leveraged for session hijacking, phishing, or delivering further malware, especially in web applications handling sensitive user data.
Potential Impact
For European organizations using O2OA, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Since the affected component is the Personal Profile Page, attackers could potentially steal session cookies, impersonate users, or manipulate displayed content to deceive users. This can lead to unauthorized access to personal information or internal resources if session tokens are compromised. The medium severity suggests that while the impact is not catastrophic, it can facilitate further attacks or data leakage. Organizations in sectors such as government, finance, healthcare, and enterprises relying on O2OA for collaboration or personal data management could face reputational damage, regulatory scrutiny under GDPR for data breaches, and operational disruptions. The requirement for user interaction means social engineering or phishing campaigns could be used to exploit this vulnerability, increasing the attack surface. The lack of an immediate patch necessitates interim mitigations to reduce risk.
Mitigation Recommendations
European organizations should implement several specific measures beyond generic advice: 1) Apply strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the vulnerable endpoint (/x_program_center/jaxrs/agent). 3) Conduct thorough input validation and output encoding on all user-supplied data within the Personal Profile Page, especially if customizations or extensions are in place. 4) Educate users about the risks of clicking unknown or suspicious links, as exploitation requires user interaction. 5) Monitor web server and application logs for unusual requests or patterns indicative of exploitation attempts. 6) Plan for timely upgrade to the fixed version once the vendor releases a patch. 7) If feasible, restrict access to the affected component through network segmentation or access controls to limit exposure. 8) Implement multi-factor authentication (MFA) to reduce the impact of stolen session tokens.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T10:49:37.919Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b2bab8ad5a09ad00807dc0
Added to database: 8/30/2025, 8:47:52 AM
Last enriched: 8/30/2025, 9:02:50 AM
Last updated: 8/30/2025, 12:33:24 PM
Views: 6
Related Threats
CVE-2025-9691: SQL Injection in Campcodes Online Shopping System
MediumCVE-2025-9690: SQL Injection in SourceCodester Advanced School Management System
MediumCVE-2025-9689: SQL Injection in SourceCodester Advanced School Management System
MediumCVE-2025-0165: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM watsonx Orchestrate Cartridge for IBM Cloud Pak for Data
HighCVE-2025-9688: Integer Overflow in Mupen64Plus
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.