Skip to main content

CVE-2025-9682: Cross Site Scripting in O2OA

Medium
VulnerabilityCVE-2025-9682cvecve-2025-9682
Published: Sat Aug 30 2025 (08/30/2025, 09:32:07 UTC)
Source: CVE Database V5
Product: O2OA

Description

A vulnerability has been found in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_cms_assemble_control/jaxrs/design/appdict of the component Personal Profile Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

AI-Powered Analysis

AILast updated: 08/30/2025, 10:02:46 UTC

Technical Analysis

CVE-2025-9682 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified functionality within the file /x_cms_assemble_control/jaxrs/design/appdict, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that can be executed in the context of a victim's browser session. The attack vector is remote, requiring no prior authentication, but does require some user interaction to trigger the malicious script execution. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The CVSS vector indicates the attack is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some user interaction (UI:P), and impacts integrity slightly (VI:L) without affecting confidentiality or availability. The vendor has acknowledged the issue and plans to fix it in a future release, but as of the publication date, no official patch is available. Public disclosure of the exploit details has occurred, though no confirmed exploitation in the wild has been reported yet. This vulnerability could be leveraged by attackers to perform session hijacking, defacement, or phishing attacks by injecting malicious JavaScript into the Personal Profile Page, potentially compromising user data or credentials within affected deployments of O2OA.

Potential Impact

For European organizations using O2OA, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user data. Since O2OA is a collaborative office automation platform, exploitation could allow attackers to execute malicious scripts in users' browsers, leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. This could result in data leakage, unauthorized access to sensitive corporate information, or reputational damage. The requirement for user interaction means phishing or social engineering tactics could be employed to trigger the exploit. Given that many European enterprises and public sector organizations rely on collaboration tools, the impact could extend to disruption of business processes and potential compliance issues under GDPR if personal data is compromised. However, the lack of availability impact and the medium CVSS score suggest the threat is serious but not critical. Organizations with high user interaction on Personal Profile Pages or those with less mature security awareness programs may be more vulnerable.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Monitor official O2OA channels and GitHub repositories closely for the release of the security patch and apply it promptly once available. 2) Implement web application firewalls (WAFs) with rules designed to detect and block common XSS payloads targeting the affected endpoint (/x_cms_assemble_control/jaxrs/design/appdict). 3) Conduct user awareness training focused on recognizing phishing attempts and suspicious links that could trigger XSS attacks. 4) Review and harden Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing O2OA. 5) Audit and sanitize all user-generated content on Personal Profile Pages to reduce injection vectors. 6) Employ browser security features such as HTTPOnly and Secure flags on cookies to mitigate session hijacking risks. 7) If feasible, temporarily restrict or disable the vulnerable functionality until a patch is applied. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vectors disclosed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T10:49:40.647Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b2c8cead5a09ad0080cac8

Added to database: 8/30/2025, 9:47:58 AM

Last enriched: 8/30/2025, 10:02:46 AM

Last updated: 8/30/2025, 10:50:22 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats