Skip to main content

CVE-2025-9718: Cross Site Scripting in O2OA

Medium
VulnerabilityCVE-2025-9718cvecve-2025-9718
Published: Sun Aug 31 2025 (08/31/2025, 05:32:06 UTC)
Source: CVE Database V5
Product: O2OA

Description

A security flaw has been discovered in O2OA up to 10.0-410. This affects an unknown part of the file /x_processplatform_assemble_designer/jaxrs/process of the component Personal Profile Page. Performing manipulation of the argument name/alias results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

AI-Powered Analysis

AILast updated: 08/31/2025, 06:02:45 UTC

Technical Analysis

CVE-2025-9718 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in the Personal Profile Page component, within the file /x_processplatform_assemble_designer/jaxrs/process. The flaw is triggered by manipulating the 'name' or 'alias' argument, which is not properly sanitized, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, requiring only user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The vendor has acknowledged the issue and indicated that a fix will be included in an upcoming version, but as of the published date, no patch is available. Public exploit code has been released, increasing the risk of exploitation. The vulnerability impacts confidentiality and integrity to a limited extent, as it allows script execution in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. Availability impact is negligible. The attack vector is network-based, with low attack complexity and no privileges required, but user interaction is necessary to trigger the exploit.

Potential Impact

For European organizations using O2OA, particularly those running affected versions (up to 10.0-410), this vulnerability poses a tangible risk of client-side attacks that can compromise user sessions and data confidentiality. Organizations in sectors with sensitive personal or business data, such as finance, healthcare, and government, could face targeted exploitation attempts. The presence of public exploit code increases the likelihood of opportunistic attacks, especially in environments where users access O2OA via web browsers. Successful exploitation could lead to unauthorized access to user accounts, data leakage, and potential lateral movement within internal networks if session tokens or credentials are stolen. Additionally, reputational damage and regulatory consequences under GDPR could arise if personal data is compromised. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent exploitation, especially in environments with high-value targets or sensitive information.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately upgrade to the latest O2OA version once the vendor releases the patch addressing CVE-2025-9718. 2) Until a patch is available, apply web application firewall (WAF) rules to detect and block suspicious input patterns targeting the 'name' and 'alias' parameters in the affected endpoint. 3) Conduct thorough input validation and output encoding on all user-supplied data within the application, especially in custom deployments or integrations of O2OA. 4) Educate users about the risks of clicking on untrusted links and encourage the use of modern browsers with built-in XSS protections. 5) Monitor web server and application logs for unusual requests or error patterns related to the vulnerable endpoint. 6) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing O2OA. 7) Review and restrict user privileges to minimize the impact of compromised accounts. These measures, combined with timely patching, will reduce the risk of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-30T11:05:24.988Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b3e200ad5a09ad00b46313

Added to database: 8/31/2025, 5:47:44 AM

Last enriched: 8/31/2025, 6:02:45 AM

Last updated: 9/1/2025, 12:34:18 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats