Skip to main content

CVE-2025-9735: Cross Site Scripting in O2OA

Medium
VulnerabilityCVE-2025-9735cvecve-2025-9735
Published: Sun Aug 31 2025 (08/31/2025, 15:32:06 UTC)
Source: CVE Database V5
Product: O2OA

Description

A weakness has been identified in O2OA up to 10.0-410. This affects an unknown function of the file /x_query_assemble_designer/jaxrs/table of the component Personal Profile Page. This manipulation of the argument description/applicationName/queryName causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

AI-Powered Analysis

AILast updated: 08/31/2025, 16:02:43 UTC

Technical Analysis

CVE-2025-9735 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the file /x_query_assemble_designer/jaxrs/table, which is part of the Personal Profile Page component. The issue arises due to improper sanitization or validation of user-controllable input parameters such as description, applicationName, or queryName. An attacker can manipulate these parameters to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without requiring authentication, although it requires user interaction (e.g., the victim visiting a crafted URL or page). The CVSS 4.0 base score is 5.1, indicating a medium severity level, reflecting the moderate impact on confidentiality and integrity with limited impact on availability. The vendor has acknowledged the issue and plans to fix it in a forthcoming version, but no patch is currently available. Public exploit code has been released, increasing the risk of exploitation. The vulnerability does not require privileges or authentication, making it accessible to remote attackers. The attack vector is network-based, and the vulnerability does not involve scope changes or complex attack conditions. The presence of this XSS flaw could allow attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, potentially leading to further compromise or data leakage within affected environments.

Potential Impact

For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a tangible risk to user data confidentiality and integrity. As O2OA is a collaborative office automation platform, exploitation could lead to unauthorized script execution in users' browsers, enabling session hijacking, credential theft, or unauthorized actions performed on behalf of users. This could disrupt business operations, damage organizational reputation, and lead to compliance issues under regulations such as GDPR if personal data is exposed or misused. The medium severity score reflects that while availability impact is minimal, the confidentiality and integrity risks are significant, especially in environments where sensitive or personal data is handled. The public availability of exploit code increases the likelihood of opportunistic attacks, particularly targeting organizations with limited patch management capabilities. Additionally, phishing campaigns leveraging this XSS flaw could be used to escalate attacks or deliver secondary payloads. The lack of an immediate patch means organizations must rely on mitigations to reduce exposure until an update is released.

Mitigation Recommendations

European organizations should implement several targeted mitigation strategies: 1) Apply strict input validation and output encoding on all user-supplied data within O2OA, especially parameters like description, applicationName, and queryName, to prevent script injection. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the O2OA platform. 3) Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting the vulnerable endpoints. 4) Educate users about the risks of clicking on suspicious links and encourage cautious behavior to reduce the risk of social engineering exploitation. 5) Monitor logs and network traffic for unusual activity indicative of exploitation attempts. 6) Coordinate with the vendor to obtain timely updates and plan for rapid deployment of the forthcoming patch. 7) Where feasible, restrict access to the affected O2OA components to trusted networks or VPNs to limit exposure. 8) Consider temporary disabling or restricting the vulnerable functionality if it is not critical to operations until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-30T16:40:55.219Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b46eaaad5a09ad00be4373

Added to database: 8/31/2025, 3:47:54 PM

Last enriched: 8/31/2025, 4:02:43 PM

Last updated: 8/31/2025, 5:43:44 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats