Skip to main content

CVE-2025-9736: Cross Site Scripting in O2OA

Medium
VulnerabilityCVE-2025-9736cvecve-2025-9736
Published: Sun Aug 31 2025 (08/31/2025, 16:02:06 UTC)
Source: CVE Database V5
Product: O2OA

Description

A security vulnerability has been detected in O2OA up to 10.0-410. This impacts an unknown function of the file /x_query_assemble_designer/jaxrs/statement of the component Personal Profile Page. Such manipulation of the argument description/queryName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

AI-Powered Analysis

AILast updated: 08/31/2025, 16:32:54 UTC

Technical Analysis

CVE-2025-9736 is a cross-site scripting (XSS) vulnerability identified in the O2OA software, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the file /x_query_assemble_designer/jaxrs/statement, which is part of the Personal Profile Page component. The issue arises due to improper sanitization or validation of the 'description' or 'queryName' parameters, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary for the malicious script to execute (e.g., a victim clicking a crafted link). The CVSS v4.0 base score is 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is needed. The impact primarily affects the confidentiality and integrity of the user's session or data, with limited impact on availability. The vendor has acknowledged the issue and plans to fix it in a future release, but no patch is currently available. Public disclosure of the exploit details increases the risk of exploitation, although no known active exploitation in the wild has been reported yet.

Potential Impact

For European organizations using O2OA up to version 10.0-410, this XSS vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. This is particularly concerning for organizations that use O2OA for managing personal profiles or sensitive user data. The vulnerability could be leveraged in targeted phishing campaigns or drive-by attacks to compromise user accounts or gain footholds within internal networks. Given the remote exploitability and the public disclosure, the likelihood of attacks may increase. However, the requirement for user interaction and the medium severity score somewhat limit the overall impact. Still, organizations handling personal or sensitive data must consider the reputational and regulatory implications, especially under GDPR, if user data confidentiality is compromised.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately review and restrict access to the affected Personal Profile Page component to trusted users only, minimizing exposure. 2) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'description' and 'queryName' parameters. 3) Educate users about phishing and suspicious links to reduce the risk of user interaction with malicious content. 4) Monitor logs for unusual requests or patterns indicative of exploitation attempts targeting the vulnerable endpoint. 5) Plan and prioritize upgrading O2OA to the fixed version once released by the vendor. 6) In the interim, consider applying input validation or sanitization at the application or proxy level if feasible. 7) Conduct internal penetration testing focusing on this vulnerability to assess exposure and effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-30T16:40:57.783Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b475a6ad5a09ad00bf347d

Added to database: 8/31/2025, 4:17:42 PM

Last enriched: 8/31/2025, 4:32:54 PM

Last updated: 8/31/2025, 5:43:44 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats