Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9682: Cross Site Scripting in O2OA

0
Medium
VulnerabilityCVE-2025-9682cvecve-2025-9682
Published: Sat Aug 30 2025 (08/30/2025, 09:32:07 UTC)
Source: CVE Database V5
Product: O2OA

Description

A vulnerability has been found in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_cms_assemble_control/jaxrs/design/appdict of the component Personal Profile Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

AI-Powered Analysis

AILast updated: 09/07/2025, 00:37:32 UTC

Technical Analysis

CVE-2025-9682 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified functionality within the file /x_cms_assemble_control/jaxrs/design/appdict, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that execute in the context of a victim's browser when they access the affected page. The vulnerability can be exploited remotely without prior authentication, although user interaction is required to trigger the malicious payload (e.g., visiting a crafted URL). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector details show the attack is network accessible (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some user interaction (UI:P), and impacts confidentiality and integrity to a limited degree (VI:L, VC:N). The vendor has acknowledged the issue publicly via GitHub and plans to fix it in a future release, but as of the publication date, no patch has been released. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the risk of exploitation attempts. XSS vulnerabilities like this can be leveraged for session hijacking, phishing, or delivering further attacks such as malware installation or privilege escalation, depending on the victim's browser and environment.

Potential Impact

For European organizations using O2OA, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Since the affected component is the Personal Profile Page, attackers could target user accounts to steal session cookies or perform actions on behalf of users, potentially leading to unauthorized access or data leakage. Organizations with sensitive or regulated data could face compliance issues if user data is compromised. The remote exploitability without authentication increases the attack surface, especially for publicly accessible O2OA deployments. The medium severity suggests moderate impact, but the presence of public exploit code could lead to increased attack attempts. Additionally, if exploited in environments with weak security controls, attackers might chain this XSS with other vulnerabilities to escalate impact. For European entities, this could affect internal collaboration platforms, intranet portals, or customer-facing services relying on O2OA, potentially disrupting business operations or damaging reputation.

Mitigation Recommendations

Organizations should prioritize upgrading O2OA to the vendor's forthcoming patched version once available. In the interim, implement strict input validation and output encoding on the affected endpoints to neutralize malicious scripts. Deploy web application firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the vulnerable URI path. Enforce Content Security Policy (CSP) headers to restrict script execution origins, reducing the impact of injected scripts. Conduct user awareness training to recognize phishing attempts that may leverage this vulnerability. Monitor logs for suspicious requests to /x_cms_assemble_control/jaxrs/design/appdict and unusual user activity indicative of exploitation. If feasible, restrict access to the vulnerable component to trusted networks or authenticated users only, reducing exposure. Regularly review and update security controls around O2OA deployments, including patch management and vulnerability scanning.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T10:49:40.647Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b2c8cead5a09ad0080cac8

Added to database: 8/30/2025, 9:47:58 AM

Last enriched: 9/7/2025, 12:37:32 AM

Last updated: 10/14/2025, 11:41:41 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats