CVE-2025-9719: Cross Site Scripting in O2OA
A weakness has been identified in O2OA up to 10.0-410. This vulnerability affects unknown code of the file /x_processplatform_assemble_designer/jaxrs/script of the component Personal Profile Page. Executing manipulation of the argument name/alias/description/applicationName can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-9719 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in the Personal Profile Page component, within the /x_processplatform_assemble_designer/jaxrs/script endpoint. It arises from improper sanitization or validation of user-supplied input parameters such as name, alias, description, and applicationName. An attacker can remotely exploit this flaw by injecting malicious scripts into these parameters, which are then executed in the context of other users' browsers when they access the affected page. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability requires no authentication (PR:L means low privileges, but AT:N means no authentication required) and no user interaction beyond visiting a crafted URL or page containing the malicious payload (UI:P indicates some user interaction is needed, e.g., clicking a link). The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, partial user interaction, and limited impact on confidentiality and integrity but no impact on availability. Although no public exploit is currently known in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability affects an unknown code section within the specified endpoint, indicating that the root cause is likely input validation or output encoding failures in the web application’s scripting interface.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially leading to theft of session cookies, credentials, or sensitive personal information. This could facilitate further attacks such as account takeover or lateral movement within the organization. The impact on confidentiality and integrity is partial but significant in environments where O2OA is used for managing personal profiles or sensitive application data. Availability is not affected. Given that the attack can be launched remotely without authentication, any exposed O2OA instances accessible over the internet or internal networks are at risk. European organizations with web-facing O2OA deployments may face reputational damage, regulatory scrutiny under GDPR if personal data is compromised, and operational disruptions if user trust is eroded. The medium severity rating suggests that while this is not a critical vulnerability, it should be addressed promptly to prevent exploitation.
Mitigation Recommendations
1. Immediate patching or upgrading to a fixed version of O2OA once available is the most effective mitigation. Since no patch links are currently provided, organizations should monitor vendor advisories closely. 2. In the interim, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the name, alias, description, and applicationName parameters, focusing on script tags and common XSS payloads. 3. Conduct a thorough review and hardening of input validation and output encoding mechanisms in the affected endpoint, ensuring all user inputs are properly sanitized and encoded before rendering. 4. Restrict access to the vulnerable endpoint by network segmentation or IP whitelisting to reduce exposure, especially for internet-facing instances. 5. Educate users to be cautious about clicking on suspicious links or interacting with untrusted content related to O2OA. 6. Enable Content Security Policy (CSP) headers on web servers hosting O2OA to limit the execution of unauthorized scripts. 7. Monitor logs and network traffic for signs of attempted exploitation or unusual activity related to the vulnerable parameters.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9719: Cross Site Scripting in O2OA
Description
A weakness has been identified in O2OA up to 10.0-410. This vulnerability affects unknown code of the file /x_processplatform_assemble_designer/jaxrs/script of the component Personal Profile Page. Executing manipulation of the argument name/alias/description/applicationName can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-9719 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in the Personal Profile Page component, within the /x_processplatform_assemble_designer/jaxrs/script endpoint. It arises from improper sanitization or validation of user-supplied input parameters such as name, alias, description, and applicationName. An attacker can remotely exploit this flaw by injecting malicious scripts into these parameters, which are then executed in the context of other users' browsers when they access the affected page. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability requires no authentication (PR:L means low privileges, but AT:N means no authentication required) and no user interaction beyond visiting a crafted URL or page containing the malicious payload (UI:P indicates some user interaction is needed, e.g., clicking a link). The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, partial user interaction, and limited impact on confidentiality and integrity but no impact on availability. Although no public exploit is currently known in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability affects an unknown code section within the specified endpoint, indicating that the root cause is likely input validation or output encoding failures in the web application’s scripting interface.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially leading to theft of session cookies, credentials, or sensitive personal information. This could facilitate further attacks such as account takeover or lateral movement within the organization. The impact on confidentiality and integrity is partial but significant in environments where O2OA is used for managing personal profiles or sensitive application data. Availability is not affected. Given that the attack can be launched remotely without authentication, any exposed O2OA instances accessible over the internet or internal networks are at risk. European organizations with web-facing O2OA deployments may face reputational damage, regulatory scrutiny under GDPR if personal data is compromised, and operational disruptions if user trust is eroded. The medium severity rating suggests that while this is not a critical vulnerability, it should be addressed promptly to prevent exploitation.
Mitigation Recommendations
1. Immediate patching or upgrading to a fixed version of O2OA once available is the most effective mitigation. Since no patch links are currently provided, organizations should monitor vendor advisories closely. 2. In the interim, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the name, alias, description, and applicationName parameters, focusing on script tags and common XSS payloads. 3. Conduct a thorough review and hardening of input validation and output encoding mechanisms in the affected endpoint, ensuring all user inputs are properly sanitized and encoded before rendering. 4. Restrict access to the vulnerable endpoint by network segmentation or IP whitelisting to reduce exposure, especially for internet-facing instances. 5. Educate users to be cautious about clicking on suspicious links or interacting with untrusted content related to O2OA. 6. Enable Content Security Policy (CSP) headers on web servers hosting O2OA to limit the execution of unauthorized scripts. 7. Monitor logs and network traffic for signs of attempted exploitation or unusual activity related to the vulnerable parameters.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-30T11:05:27.866Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b3e908ad5a09ad00b532e4
Added to database: 8/31/2025, 6:17:44 AM
Last enriched: 8/31/2025, 6:32:45 AM
Last updated: 9/1/2025, 12:34:18 AM
Views: 8
Related Threats
CVE-2025-9772: Unrestricted Upload in RemoteClinic
MediumCVE-2025-9771: SQL Injection in SourceCodester Eye Clinic Management System
MediumCVE-2025-9770: SQL Injection in Campcodes Hospital Management System
MediumCVE-2025-9769: Command Injection in D-Link DI-7400G+
LowCVE-2025-9768: SQL Injection in itsourcecode Sports Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.