CVE-2025-9735: Cross Site Scripting in O2OA
A weakness has been identified in O2OA up to 10.0-410. This affects an unknown function of the file /x_query_assemble_designer/jaxrs/table of the component Personal Profile Page. This manipulation of the argument description/applicationName/queryName causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI Analysis
Technical Summary
CVE-2025-9735 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the file /x_query_assemble_designer/jaxrs/table, which is part of the Personal Profile Page component. The issue arises due to improper sanitization or validation of user-controllable input parameters such as description, applicationName, or queryName. An attacker can manipulate these parameters to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without requiring authentication, although it requires user interaction (e.g., the victim visiting a crafted URL or page). The CVSS 4.0 base score is 5.1, indicating a medium severity level, reflecting the moderate impact on confidentiality and integrity with limited impact on availability. The vendor has acknowledged the issue and plans to fix it in a forthcoming version, but no patch is currently available. Public exploit code has been released, increasing the risk of exploitation. The vulnerability does not require privileges or authentication, making it accessible to remote attackers. The attack vector is network-based, and the vulnerability does not involve scope changes or complex attack conditions. The presence of this XSS flaw could allow attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, potentially leading to further compromise or data leakage within affected environments.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a tangible risk to user data confidentiality and integrity. As O2OA is a collaborative office automation platform, exploitation could lead to unauthorized script execution in users' browsers, enabling session hijacking, credential theft, or unauthorized actions performed on behalf of users. This could disrupt business operations, damage organizational reputation, and lead to compliance issues under regulations such as GDPR if personal data is exposed or misused. The medium severity score reflects that while availability impact is minimal, the confidentiality and integrity risks are significant, especially in environments where sensitive or personal data is handled. The public availability of exploit code increases the likelihood of opportunistic attacks, particularly targeting organizations with limited patch management capabilities. Additionally, phishing campaigns leveraging this XSS flaw could be used to escalate attacks or deliver secondary payloads. The lack of an immediate patch means organizations must rely on mitigations to reduce exposure until an update is released.
Mitigation Recommendations
European organizations should implement several targeted mitigation strategies: 1) Apply strict input validation and output encoding on all user-supplied data within O2OA, especially parameters like description, applicationName, and queryName, to prevent script injection. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the O2OA platform. 3) Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting the vulnerable endpoints. 4) Educate users about the risks of clicking on suspicious links and encourage cautious behavior to reduce the risk of social engineering exploitation. 5) Monitor logs and network traffic for unusual activity indicative of exploitation attempts. 6) Coordinate with the vendor to obtain timely updates and plan for rapid deployment of the forthcoming patch. 7) Where feasible, restrict access to the affected O2OA components to trusted networks or VPNs to limit exposure. 8) Consider temporary disabling or restricting the vulnerable functionality if it is not critical to operations until a patch is available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-9735: Cross Site Scripting in O2OA
Description
A weakness has been identified in O2OA up to 10.0-410. This affects an unknown function of the file /x_query_assemble_designer/jaxrs/table of the component Personal Profile Page. This manipulation of the argument description/applicationName/queryName causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
AI-Powered Analysis
Technical Analysis
CVE-2025-9735 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the file /x_query_assemble_designer/jaxrs/table, which is part of the Personal Profile Page component. The issue arises due to improper sanitization or validation of user-controllable input parameters such as description, applicationName, or queryName. An attacker can manipulate these parameters to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without requiring authentication, although it requires user interaction (e.g., the victim visiting a crafted URL or page). The CVSS 4.0 base score is 5.1, indicating a medium severity level, reflecting the moderate impact on confidentiality and integrity with limited impact on availability. The vendor has acknowledged the issue and plans to fix it in a forthcoming version, but no patch is currently available. Public exploit code has been released, increasing the risk of exploitation. The vulnerability does not require privileges or authentication, making it accessible to remote attackers. The attack vector is network-based, and the vulnerability does not involve scope changes or complex attack conditions. The presence of this XSS flaw could allow attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, potentially leading to further compromise or data leakage within affected environments.
Potential Impact
For European organizations using O2OA version 10.0-410 or earlier, this vulnerability poses a tangible risk to user data confidentiality and integrity. As O2OA is a collaborative office automation platform, exploitation could lead to unauthorized script execution in users' browsers, enabling session hijacking, credential theft, or unauthorized actions performed on behalf of users. This could disrupt business operations, damage organizational reputation, and lead to compliance issues under regulations such as GDPR if personal data is exposed or misused. The medium severity score reflects that while availability impact is minimal, the confidentiality and integrity risks are significant, especially in environments where sensitive or personal data is handled. The public availability of exploit code increases the likelihood of opportunistic attacks, particularly targeting organizations with limited patch management capabilities. Additionally, phishing campaigns leveraging this XSS flaw could be used to escalate attacks or deliver secondary payloads. The lack of an immediate patch means organizations must rely on mitigations to reduce exposure until an update is released.
Mitigation Recommendations
European organizations should implement several targeted mitigation strategies: 1) Apply strict input validation and output encoding on all user-supplied data within O2OA, especially parameters like description, applicationName, and queryName, to prevent script injection. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the O2OA platform. 3) Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting the vulnerable endpoints. 4) Educate users about the risks of clicking on suspicious links and encourage cautious behavior to reduce the risk of social engineering exploitation. 5) Monitor logs and network traffic for unusual activity indicative of exploitation attempts. 6) Coordinate with the vendor to obtain timely updates and plan for rapid deployment of the forthcoming patch. 7) Where feasible, restrict access to the affected O2OA components to trusted networks or VPNs to limit exposure. 8) Consider temporary disabling or restricting the vulnerable functionality if it is not critical to operations until a patch is available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-30T16:40:55.219Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b46eaaad5a09ad00be4373
Added to database: 8/31/2025, 3:47:54 PM
Last enriched: 8/31/2025, 4:02:43 PM
Last updated: 8/31/2025, 5:43:44 PM
Views: 3
Related Threats
CVE-2025-9744: SQL Injection in Campcodes Online Loan Management System
MediumCVE-2025-9743: SQL Injection in code-projects Human Resource Integrated System
MediumCVE-2025-9742: SQL Injection in code-projects Human Resource Integrated System
MediumCVE-2025-9741: SQL Injection in code-projects Human Resource Integrated System
MediumCVE-2025-9740: SQL Injection in code-projects Human Resource Integrated System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.