CVE-2025-9734: Cross Site Scripting in O2OA
A security flaw has been discovered in O2OA up to 10.0-410. The impacted element is an unknown function of the file /x_query_assemble_designer/jaxrs/stat of the component Personal Profile Page. The manipulation of the argument name/alias/description/applicationName results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9734 is a medium-severity cross-site scripting (XSS) vulnerability affecting O2OA versions up to 10.0-410. The vulnerability exists in an unspecified function within the file /x_query_assemble_designer/jaxrs/stat, which is part of the Personal Profile Page component. The flaw arises from improper sanitization or validation of user-controllable input parameters such as name, alias, description, and applicationName. An attacker can remotely craft malicious input to these parameters, which when processed by the vulnerable endpoint, results in the injection and execution of arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, credential theft, or other malicious actions performed on behalf of the user. The vulnerability does not require authentication but does require user interaction (e.g., the victim visiting a crafted URL or page). The vendor has acknowledged the issue and indicated a fix will be included in a future release, but as of the published date, no patch is available. Public exploit code has been released, increasing the risk of exploitation. The CVSS 4.0 score is 5.1 (medium), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and limited impact on integrity and availability.
Potential Impact
For European organizations using O2OA, particularly those deploying the affected versions in internal or external-facing environments, this vulnerability poses a risk of client-side compromise. Attackers could exploit this flaw to execute malicious scripts in users' browsers, potentially leading to theft of session tokens, unauthorized actions within the application, or phishing attacks leveraging the trusted application interface. This is especially concerning for organizations handling sensitive personal or business data via O2OA's Personal Profile Page. The impact is primarily on confidentiality and integrity of user sessions and data. While the vulnerability does not directly affect server availability or integrity, successful exploitation could facilitate further attacks or data leakage. European organizations with remote-accessible O2OA deployments are at higher risk, as the attack can be launched remotely without authentication. The public availability of exploit code increases the likelihood of opportunistic attacks, making timely mitigation critical.
Mitigation Recommendations
Organizations should immediately audit their O2OA deployments to identify affected versions (up to 10.0-410). Until an official patch is released, implement the following mitigations: 1) Apply strict input validation and output encoding on the parameters name, alias, description, and applicationName at the application or web server level to neutralize malicious scripts. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the vulnerable endpoint. 3) Restrict access to the /x_query_assemble_designer/jaxrs/stat endpoint to trusted internal networks or authenticated users where possible. 4) Educate users about the risks of clicking suspicious links and encourage use of modern browsers with built-in XSS protection. 5) Monitor logs for unusual requests to the vulnerable endpoint and signs of exploitation attempts. 6) Plan and prioritize upgrading to the fixed version once released by the vendor. These targeted measures go beyond generic advice by focusing on the specific vulnerable component and attack vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9734: Cross Site Scripting in O2OA
Description
A security flaw has been discovered in O2OA up to 10.0-410. The impacted element is an unknown function of the file /x_query_assemble_designer/jaxrs/stat of the component Personal Profile Page. The manipulation of the argument name/alias/description/applicationName results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9734 is a medium-severity cross-site scripting (XSS) vulnerability affecting O2OA versions up to 10.0-410. The vulnerability exists in an unspecified function within the file /x_query_assemble_designer/jaxrs/stat, which is part of the Personal Profile Page component. The flaw arises from improper sanitization or validation of user-controllable input parameters such as name, alias, description, and applicationName. An attacker can remotely craft malicious input to these parameters, which when processed by the vulnerable endpoint, results in the injection and execution of arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, credential theft, or other malicious actions performed on behalf of the user. The vulnerability does not require authentication but does require user interaction (e.g., the victim visiting a crafted URL or page). The vendor has acknowledged the issue and indicated a fix will be included in a future release, but as of the published date, no patch is available. Public exploit code has been released, increasing the risk of exploitation. The CVSS 4.0 score is 5.1 (medium), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and limited impact on integrity and availability.
Potential Impact
For European organizations using O2OA, particularly those deploying the affected versions in internal or external-facing environments, this vulnerability poses a risk of client-side compromise. Attackers could exploit this flaw to execute malicious scripts in users' browsers, potentially leading to theft of session tokens, unauthorized actions within the application, or phishing attacks leveraging the trusted application interface. This is especially concerning for organizations handling sensitive personal or business data via O2OA's Personal Profile Page. The impact is primarily on confidentiality and integrity of user sessions and data. While the vulnerability does not directly affect server availability or integrity, successful exploitation could facilitate further attacks or data leakage. European organizations with remote-accessible O2OA deployments are at higher risk, as the attack can be launched remotely without authentication. The public availability of exploit code increases the likelihood of opportunistic attacks, making timely mitigation critical.
Mitigation Recommendations
Organizations should immediately audit their O2OA deployments to identify affected versions (up to 10.0-410). Until an official patch is released, implement the following mitigations: 1) Apply strict input validation and output encoding on the parameters name, alias, description, and applicationName at the application or web server level to neutralize malicious scripts. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the vulnerable endpoint. 3) Restrict access to the /x_query_assemble_designer/jaxrs/stat endpoint to trusted internal networks or authenticated users where possible. 4) Educate users about the risks of clicking suspicious links and encourage use of modern browsers with built-in XSS protection. 5) Monitor logs for unusual requests to the vulnerable endpoint and signs of exploitation attempts. 6) Plan and prioritize upgrading to the fixed version once released by the vendor. These targeted measures go beyond generic advice by focusing on the specific vulnerable component and attack vectors.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-30T16:40:51.892Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b46795ad5a09ad00bd3d5a
Added to database: 8/31/2025, 3:17:41 PM
Last enriched: 8/31/2025, 3:32:44 PM
Last updated: 9/1/2025, 6:23:12 AM
Views: 9
Related Threats
CVE-2025-36133: CWE-532 Insertion of Sensitive Information into Log File in IBM App Connect Enterprise Certified Container
MediumCVE-2025-9775: Unrestricted Upload in RemoteClinic
MediumCVE-2025-9774: Information Disclosure in RemoteClinic
MediumCVE-2025-9773: Cross Site Scripting in RemoteClinic
MediumCVE-2025-9772: Unrestricted Upload in RemoteClinic
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.