CVE-2025-9718: Cross Site Scripting in O2OA
A security flaw has been discovered in O2OA up to 10.0-410. This affects an unknown part of the file /x_processplatform_assemble_designer/jaxrs/process of the component Personal Profile Page. Performing manipulation of the argument name/alias results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9718 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in the Personal Profile Page component, within the file /x_processplatform_assemble_designer/jaxrs/process. The flaw is triggered by manipulating the 'name' or 'alias' argument, which is not properly sanitized, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, requiring only user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The vendor has acknowledged the issue and indicated that a fix will be included in an upcoming version, but as of the published date, no patch is available. Public exploit code has been released, increasing the risk of exploitation. The vulnerability impacts confidentiality and integrity to a limited extent, as it allows script execution in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. Availability impact is negligible. The attack vector is network-based, with low attack complexity and no privileges required, but user interaction is necessary to trigger the exploit.
Potential Impact
For European organizations using O2OA, particularly those running affected versions (up to 10.0-410), this vulnerability poses a tangible risk of client-side attacks that can compromise user sessions and data confidentiality. Organizations in sectors with sensitive personal or business data, such as finance, healthcare, and government, could face targeted exploitation attempts. The presence of public exploit code increases the likelihood of opportunistic attacks, especially in environments where users access O2OA via web browsers. Successful exploitation could lead to unauthorized access to user accounts, data leakage, and potential lateral movement within internal networks if session tokens or credentials are stolen. Additionally, reputational damage and regulatory consequences under GDPR could arise if personal data is compromised. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent exploitation, especially in environments with high-value targets or sensitive information.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately upgrade to the latest O2OA version once the vendor releases the patch addressing CVE-2025-9718. 2) Until a patch is available, apply web application firewall (WAF) rules to detect and block suspicious input patterns targeting the 'name' and 'alias' parameters in the affected endpoint. 3) Conduct thorough input validation and output encoding on all user-supplied data within the application, especially in custom deployments or integrations of O2OA. 4) Educate users about the risks of clicking on untrusted links and encourage the use of modern browsers with built-in XSS protections. 5) Monitor web server and application logs for unusual requests or error patterns related to the vulnerable endpoint. 6) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing O2OA. 7) Review and restrict user privileges to minimize the impact of compromised accounts. These measures, combined with timely patching, will reduce the risk of successful exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9718: Cross Site Scripting in O2OA
Description
A security flaw has been discovered in O2OA up to 10.0-410. This affects an unknown part of the file /x_processplatform_assemble_designer/jaxrs/process of the component Personal Profile Page. Performing manipulation of the argument name/alias results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9718 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in the Personal Profile Page component, within the file /x_processplatform_assemble_designer/jaxrs/process. The flaw is triggered by manipulating the 'name' or 'alias' argument, which is not properly sanitized, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, requiring only user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The vendor has acknowledged the issue and indicated that a fix will be included in an upcoming version, but as of the published date, no patch is available. Public exploit code has been released, increasing the risk of exploitation. The vulnerability impacts confidentiality and integrity to a limited extent, as it allows script execution in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. Availability impact is negligible. The attack vector is network-based, with low attack complexity and no privileges required, but user interaction is necessary to trigger the exploit.
Potential Impact
For European organizations using O2OA, particularly those running affected versions (up to 10.0-410), this vulnerability poses a tangible risk of client-side attacks that can compromise user sessions and data confidentiality. Organizations in sectors with sensitive personal or business data, such as finance, healthcare, and government, could face targeted exploitation attempts. The presence of public exploit code increases the likelihood of opportunistic attacks, especially in environments where users access O2OA via web browsers. Successful exploitation could lead to unauthorized access to user accounts, data leakage, and potential lateral movement within internal networks if session tokens or credentials are stolen. Additionally, reputational damage and regulatory consequences under GDPR could arise if personal data is compromised. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent exploitation, especially in environments with high-value targets or sensitive information.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately upgrade to the latest O2OA version once the vendor releases the patch addressing CVE-2025-9718. 2) Until a patch is available, apply web application firewall (WAF) rules to detect and block suspicious input patterns targeting the 'name' and 'alias' parameters in the affected endpoint. 3) Conduct thorough input validation and output encoding on all user-supplied data within the application, especially in custom deployments or integrations of O2OA. 4) Educate users about the risks of clicking on untrusted links and encourage the use of modern browsers with built-in XSS protections. 5) Monitor web server and application logs for unusual requests or error patterns related to the vulnerable endpoint. 6) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing O2OA. 7) Review and restrict user privileges to minimize the impact of compromised accounts. These measures, combined with timely patching, will reduce the risk of successful exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-30T11:05:24.988Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b3e200ad5a09ad00b46313
Added to database: 8/31/2025, 5:47:44 AM
Last enriched: 8/31/2025, 6:02:45 AM
Last updated: 9/1/2025, 12:34:18 AM
Views: 11
Related Threats
CVE-2025-9764: SQL Injection in itsourcecode Sports Management System
MediumCVE-2025-54857: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Seiko Solutions Inc. SkyBridge BASIC MB-A130
CriticalCVE-2025-9763: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-6507: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
CriticalCVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.