CVE-2025-9718: Cross Site Scripting in O2OA
A security flaw has been discovered in O2OA up to 10.0-410. This affects an unknown part of the file /x_processplatform_assemble_designer/jaxrs/process of the component Personal Profile Page. Performing manipulation of the argument name/alias results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9718 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in the Personal Profile Page component, within the /x_processplatform_assemble_designer/jaxrs/process endpoint. The flaw arises due to insufficient input validation or sanitization of the 'name' or 'alias' parameters, allowing an attacker to inject malicious scripts. When a victim accesses the manipulated page, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is remotely exploitable without requiring authentication, although it does require user interaction (the victim must visit the crafted URL or page). The vendor has acknowledged the issue and plans to fix it in a future release, but as of the published date, no official patch is available. Public exploit code has been released, increasing the risk of exploitation. The CVSS v4.0 score is 5.1 (medium severity), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction and having limited impact on confidentiality and integrity. This vulnerability is typical of reflected or stored XSS flaws that can be leveraged for phishing, session hijacking, or delivering further malware payloads within the O2OA environment.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a tangible risk to user security and data integrity. Successful exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions within the platform, potentially leading to data breaches or operational disruptions. Given that O2OA is a collaborative office automation platform, compromised accounts could expose internal communications, personal data, or business-critical workflows. The public availability of exploit code increases the likelihood of opportunistic attacks, especially targeting less security-aware users. This could also facilitate lateral movement within an organization's network if attackers leverage stolen credentials. The medium severity rating suggests moderate risk, but the real-world impact depends on the deployment scale and the sensitivity of data handled. European organizations must consider compliance implications under GDPR if personal data is exposed or compromised due to this vulnerability.
Mitigation Recommendations
Immediate mitigation steps include implementing strict input validation and output encoding on the affected parameters ('name' and 'alias') within the Personal Profile Page component to neutralize malicious scripts. Organizations should apply any vendor patches promptly once released. Until then, deploying web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable endpoint can reduce exposure. Security teams should conduct thorough code reviews and penetration testing focused on XSS vectors in O2OA deployments. User awareness training to recognize phishing attempts leveraging this vulnerability is also recommended. Additionally, restricting access to the affected endpoint through network segmentation or access control lists can limit attack surface. Monitoring logs for unusual requests to /x_processplatform_assemble_designer/jaxrs/process and anomalous user behavior can help detect exploitation attempts early. Finally, organizations should ensure that session management and authentication mechanisms are robust to minimize the impact of any successful XSS attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-9718: Cross Site Scripting in O2OA
Description
A security flaw has been discovered in O2OA up to 10.0-410. This affects an unknown part of the file /x_processplatform_assemble_designer/jaxrs/process of the component Personal Profile Page. Performing manipulation of the argument name/alias results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9718 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in the Personal Profile Page component, within the /x_processplatform_assemble_designer/jaxrs/process endpoint. The flaw arises due to insufficient input validation or sanitization of the 'name' or 'alias' parameters, allowing an attacker to inject malicious scripts. When a victim accesses the manipulated page, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is remotely exploitable without requiring authentication, although it does require user interaction (the victim must visit the crafted URL or page). The vendor has acknowledged the issue and plans to fix it in a future release, but as of the published date, no official patch is available. Public exploit code has been released, increasing the risk of exploitation. The CVSS v4.0 score is 5.1 (medium severity), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction and having limited impact on confidentiality and integrity. This vulnerability is typical of reflected or stored XSS flaws that can be leveraged for phishing, session hijacking, or delivering further malware payloads within the O2OA environment.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a tangible risk to user security and data integrity. Successful exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions within the platform, potentially leading to data breaches or operational disruptions. Given that O2OA is a collaborative office automation platform, compromised accounts could expose internal communications, personal data, or business-critical workflows. The public availability of exploit code increases the likelihood of opportunistic attacks, especially targeting less security-aware users. This could also facilitate lateral movement within an organization's network if attackers leverage stolen credentials. The medium severity rating suggests moderate risk, but the real-world impact depends on the deployment scale and the sensitivity of data handled. European organizations must consider compliance implications under GDPR if personal data is exposed or compromised due to this vulnerability.
Mitigation Recommendations
Immediate mitigation steps include implementing strict input validation and output encoding on the affected parameters ('name' and 'alias') within the Personal Profile Page component to neutralize malicious scripts. Organizations should apply any vendor patches promptly once released. Until then, deploying web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable endpoint can reduce exposure. Security teams should conduct thorough code reviews and penetration testing focused on XSS vectors in O2OA deployments. User awareness training to recognize phishing attempts leveraging this vulnerability is also recommended. Additionally, restricting access to the affected endpoint through network segmentation or access control lists can limit attack surface. Monitoring logs for unusual requests to /x_processplatform_assemble_designer/jaxrs/process and anomalous user behavior can help detect exploitation attempts early. Finally, organizations should ensure that session management and authentication mechanisms are robust to minimize the impact of any successful XSS attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-30T11:05:24.988Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b3e200ad5a09ad00b46313
Added to database: 8/31/2025, 5:47:44 AM
Last enriched: 9/8/2025, 12:34:26 AM
Last updated: 10/16/2025, 3:09:04 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10700: CWE-352 Cross-Site Request Forgery (CSRF) in elemntor Ally – Web Accessibility & Usability
MediumHarvard University Breached in Oracle Zero-Day Attack
MediumF5 BIG-IP Environment Breached by Nation-State Actor
MediumNew SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
MediumHow Attackers Bypass Synced Passkeys
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.