Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9716: Cross Site Scripting in O2OA

0
Medium
VulnerabilityCVE-2025-9716cvecve-2025-9716
Published: Sun Aug 31 2025 (08/31/2025, 04:32:05 UTC)
Source: CVE Database V5
Product: O2OA

Description

A vulnerability was determined in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_processplatform_assemble_designer/jaxrs/form of the component Personal Profile Page. This manipulation of the argument name/alias/description causes cross site scripting. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

AI-Powered Analysis

AILast updated: 09/08/2025, 00:34:01 UTC

Technical Analysis

CVE-2025-9716 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified functionality within the file /x_processplatform_assemble_designer/jaxrs/form, which is part of the Personal Profile Page component. The flaw arises from improper sanitization or validation of user-controllable input parameters such as name, alias, or description. An attacker can exploit this by injecting malicious scripts into these parameters, which are then executed in the context of a victim's browser when viewing the affected page. This type of vulnerability can be triggered remotely without requiring authentication, although user interaction (such as visiting a crafted URL or page) is necessary for the script execution. The vendor has acknowledged the issue and indicated that a fix will be included in a forthcoming version. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and resulting in limited integrity impact. There are no known exploits in the wild at the time of publication, but the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability primarily threatens confidentiality and integrity by enabling script injection, which can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user.

Potential Impact

For European organizations using O2OA, particularly those deploying the affected versions, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the browsers of users accessing the Personal Profile Page, potentially leading to theft of sensitive information, session tokens, or unauthorized actions within the application. This can undermine user trust and lead to data breaches or compliance violations under regulations such as GDPR. Since O2OA is a collaborative platform often used for enterprise resource planning and office automation, compromised user sessions could result in unauthorized access to internal resources or sensitive corporate data. The remote and unauthenticated nature of the attack vector increases exposure, especially in environments where users access the platform from untrusted networks or where phishing campaigns could be used to lure users into triggering the exploit. However, the requirement for user interaction and the medium severity score suggest that the threat is significant but not critical. Organizations with high user counts or those in regulated sectors should prioritize remediation to prevent potential lateral movement or data exfiltration.

Mitigation Recommendations

Organizations should immediately inventory their O2OA deployments to identify affected versions (up to 10.0-410). Until the vendor releases the patched version, implement strict input validation and output encoding on the affected endpoints if possible, to neutralize malicious scripts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable parameters (name, alias, description). Educate users about the risks of clicking on unsolicited links and implement browser security features such as Content Security Policy (CSP) to restrict script execution origins. Monitor logs for unusual activity related to the Personal Profile Page and consider isolating or restricting access to the affected component. Once the vendor patch is available, prioritize timely application of updates. Additionally, conduct penetration testing and vulnerability scanning focused on XSS vectors to ensure no residual vulnerabilities remain. For organizations with strict compliance requirements, document mitigation steps and incident response plans related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-30T11:05:20.083Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b3d3f0ad5a09ad00b081ea

Added to database: 8/31/2025, 4:47:44 AM

Last enriched: 9/8/2025, 12:34:01 AM

Last updated: 10/16/2025, 3:07:58 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats