CVE-2025-9682: Cross Site Scripting in O2OA
A vulnerability has been found in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_cms_assemble_control/jaxrs/design/appdict of the component Personal Profile Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9682 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified functionality within the file /x_cms_assemble_control/jaxrs/design/appdict, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that execute in the context of a victim's browser when they access the affected page. The vulnerability can be exploited remotely without prior authentication, although user interaction is required to trigger the malicious payload (e.g., visiting a crafted URL). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector details show the attack is network accessible (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some user interaction (UI:P), and impacts confidentiality and integrity to a limited degree (VI:L, VC:N). The vendor has acknowledged the issue publicly via GitHub and plans to fix it in a future release, but as of the publication date, no patch has been released. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the risk of exploitation attempts. XSS vulnerabilities like this can be leveraged for session hijacking, phishing, or delivering further attacks such as malware installation or privilege escalation, depending on the victim's browser and environment.
Potential Impact
For European organizations using O2OA, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Since the affected component is the Personal Profile Page, attackers could target user accounts to steal session cookies or perform actions on behalf of users, potentially leading to unauthorized access or data leakage. Organizations with sensitive or regulated data could face compliance issues if user data is compromised. The remote exploitability without authentication increases the attack surface, especially for publicly accessible O2OA deployments. The medium severity suggests moderate impact, but the presence of public exploit code could lead to increased attack attempts. Additionally, if exploited in environments with weak security controls, attackers might chain this XSS with other vulnerabilities to escalate impact. For European entities, this could affect internal collaboration platforms, intranet portals, or customer-facing services relying on O2OA, potentially disrupting business operations or damaging reputation.
Mitigation Recommendations
Organizations should prioritize upgrading O2OA to the vendor's forthcoming patched version once available. In the interim, implement strict input validation and output encoding on the affected endpoints to neutralize malicious scripts. Deploy web application firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the vulnerable URI path. Enforce Content Security Policy (CSP) headers to restrict script execution origins, reducing the impact of injected scripts. Conduct user awareness training to recognize phishing attempts that may leverage this vulnerability. Monitor logs for suspicious requests to /x_cms_assemble_control/jaxrs/design/appdict and unusual user activity indicative of exploitation. If feasible, restrict access to the vulnerable component to trusted networks or authenticated users only, reducing exposure. Regularly review and update security controls around O2OA deployments, including patch management and vulnerability scanning.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-9682: Cross Site Scripting in O2OA
Description
A vulnerability has been found in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_cms_assemble_control/jaxrs/design/appdict of the component Personal Profile Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9682 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified functionality within the file /x_cms_assemble_control/jaxrs/design/appdict, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that execute in the context of a victim's browser when they access the affected page. The vulnerability can be exploited remotely without prior authentication, although user interaction is required to trigger the malicious payload (e.g., visiting a crafted URL). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector details show the attack is network accessible (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some user interaction (UI:P), and impacts confidentiality and integrity to a limited degree (VI:L, VC:N). The vendor has acknowledged the issue publicly via GitHub and plans to fix it in a future release, but as of the publication date, no patch has been released. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the risk of exploitation attempts. XSS vulnerabilities like this can be leveraged for session hijacking, phishing, or delivering further attacks such as malware installation or privilege escalation, depending on the victim's browser and environment.
Potential Impact
For European organizations using O2OA, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Since the affected component is the Personal Profile Page, attackers could target user accounts to steal session cookies or perform actions on behalf of users, potentially leading to unauthorized access or data leakage. Organizations with sensitive or regulated data could face compliance issues if user data is compromised. The remote exploitability without authentication increases the attack surface, especially for publicly accessible O2OA deployments. The medium severity suggests moderate impact, but the presence of public exploit code could lead to increased attack attempts. Additionally, if exploited in environments with weak security controls, attackers might chain this XSS with other vulnerabilities to escalate impact. For European entities, this could affect internal collaboration platforms, intranet portals, or customer-facing services relying on O2OA, potentially disrupting business operations or damaging reputation.
Mitigation Recommendations
Organizations should prioritize upgrading O2OA to the vendor's forthcoming patched version once available. In the interim, implement strict input validation and output encoding on the affected endpoints to neutralize malicious scripts. Deploy web application firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the vulnerable URI path. Enforce Content Security Policy (CSP) headers to restrict script execution origins, reducing the impact of injected scripts. Conduct user awareness training to recognize phishing attempts that may leverage this vulnerability. Monitor logs for suspicious requests to /x_cms_assemble_control/jaxrs/design/appdict and unusual user activity indicative of exploitation. If feasible, restrict access to the vulnerable component to trusted networks or authenticated users only, reducing exposure. Regularly review and update security controls around O2OA deployments, including patch management and vulnerability scanning.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T10:49:40.647Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b2c8cead5a09ad0080cac8
Added to database: 8/30/2025, 9:47:58 AM
Last enriched: 9/7/2025, 12:37:32 AM
Last updated: 10/14/2025, 11:41:41 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54196: URL Redirection to Untrusted Site ('Open Redirect') (CWE-601) in Adobe Adobe Connect
LowCVE-2025-49553: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Connect
CriticalCVE-2025-49552: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Connect
HighCVE-2025-62376: CWE-287: Improper Authentication in pwncollege dojo
CriticalCVE-2025-61797: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.