CVE-2025-9682: Cross Site Scripting in O2OA
A vulnerability has been found in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_cms_assemble_control/jaxrs/design/appdict of the component Personal Profile Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9682 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified functionality within the file /x_cms_assemble_control/jaxrs/design/appdict, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that can be executed in the context of a victim's browser session. The attack vector is remote, requiring no prior authentication, but does require some user interaction to trigger the malicious script execution. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The CVSS vector indicates the attack is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some user interaction (UI:P), and impacts integrity slightly (VI:L) without affecting confidentiality or availability. The vendor has acknowledged the issue and plans to fix it in a future release, but as of the publication date, no official patch is available. Public disclosure of the exploit details has occurred, though no confirmed exploitation in the wild has been reported yet. This vulnerability could be leveraged by attackers to perform session hijacking, defacement, or phishing attacks by injecting malicious JavaScript into the Personal Profile Page, potentially compromising user data or credentials within affected deployments of O2OA.
Potential Impact
For European organizations using O2OA, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user data. Since O2OA is a collaborative office automation platform, exploitation could allow attackers to execute malicious scripts in users' browsers, leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. This could result in data leakage, unauthorized access to sensitive corporate information, or reputational damage. The requirement for user interaction means phishing or social engineering tactics could be employed to trigger the exploit. Given that many European enterprises and public sector organizations rely on collaboration tools, the impact could extend to disruption of business processes and potential compliance issues under GDPR if personal data is compromised. However, the lack of availability impact and the medium CVSS score suggest the threat is serious but not critical. Organizations with high user interaction on Personal Profile Pages or those with less mature security awareness programs may be more vulnerable.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Monitor official O2OA channels and GitHub repositories closely for the release of the security patch and apply it promptly once available. 2) Implement web application firewalls (WAFs) with rules designed to detect and block common XSS payloads targeting the affected endpoint (/x_cms_assemble_control/jaxrs/design/appdict). 3) Conduct user awareness training focused on recognizing phishing attempts and suspicious links that could trigger XSS attacks. 4) Review and harden Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing O2OA. 5) Audit and sanitize all user-generated content on Personal Profile Pages to reduce injection vectors. 6) Employ browser security features such as HTTPOnly and Secure flags on cookies to mitigate session hijacking risks. 7) If feasible, temporarily restrict or disable the vulnerable functionality until a patch is applied. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vectors disclosed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-9682: Cross Site Scripting in O2OA
Description
A vulnerability has been found in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_cms_assemble_control/jaxrs/design/appdict of the component Personal Profile Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9682 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified functionality within the file /x_cms_assemble_control/jaxrs/design/appdict, which is part of the Personal Profile Page component. This flaw allows an attacker to inject malicious scripts that can be executed in the context of a victim's browser session. The attack vector is remote, requiring no prior authentication, but does require some user interaction to trigger the malicious script execution. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The CVSS vector indicates the attack is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some user interaction (UI:P), and impacts integrity slightly (VI:L) without affecting confidentiality or availability. The vendor has acknowledged the issue and plans to fix it in a future release, but as of the publication date, no official patch is available. Public disclosure of the exploit details has occurred, though no confirmed exploitation in the wild has been reported yet. This vulnerability could be leveraged by attackers to perform session hijacking, defacement, or phishing attacks by injecting malicious JavaScript into the Personal Profile Page, potentially compromising user data or credentials within affected deployments of O2OA.
Potential Impact
For European organizations using O2OA, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user data. Since O2OA is a collaborative office automation platform, exploitation could allow attackers to execute malicious scripts in users' browsers, leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. This could result in data leakage, unauthorized access to sensitive corporate information, or reputational damage. The requirement for user interaction means phishing or social engineering tactics could be employed to trigger the exploit. Given that many European enterprises and public sector organizations rely on collaboration tools, the impact could extend to disruption of business processes and potential compliance issues under GDPR if personal data is compromised. However, the lack of availability impact and the medium CVSS score suggest the threat is serious but not critical. Organizations with high user interaction on Personal Profile Pages or those with less mature security awareness programs may be more vulnerable.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Monitor official O2OA channels and GitHub repositories closely for the release of the security patch and apply it promptly once available. 2) Implement web application firewalls (WAFs) with rules designed to detect and block common XSS payloads targeting the affected endpoint (/x_cms_assemble_control/jaxrs/design/appdict). 3) Conduct user awareness training focused on recognizing phishing attempts and suspicious links that could trigger XSS attacks. 4) Review and harden Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing O2OA. 5) Audit and sanitize all user-generated content on Personal Profile Pages to reduce injection vectors. 6) Employ browser security features such as HTTPOnly and Secure flags on cookies to mitigate session hijacking risks. 7) If feasible, temporarily restrict or disable the vulnerable functionality until a patch is applied. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vectors disclosed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T10:49:40.647Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b2c8cead5a09ad0080cac8
Added to database: 8/30/2025, 9:47:58 AM
Last enriched: 8/30/2025, 10:02:46 AM
Last updated: 8/30/2025, 10:50:22 AM
Views: 3
Related Threats
CVE-2025-9686: SQL Injection in Portabilis i-Educar
MediumCVE-2025-9685: SQL Injection in Portabilis i-Educar
MediumCVE-2025-9684: SQL Injection in Portabilis i-Educar
MediumCVE-2025-9683: Cross Site Scripting in O2OA
MediumCVE-2025-9681: Cross Site Scripting in O2OA
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.