Skip to main content

CVE-2025-9737: Cross Site Scripting in O2OA

Medium
VulnerabilityCVE-2025-9737cvecve-2025-9737
Published: Sun Aug 31 2025 (08/31/2025, 16:32:06 UTC)
Source: CVE Database V5
Product: O2OA

Description

A vulnerability was detected in O2OA up to 10.0-410. Affected is an unknown function of the file /x_query_assemble_designer/jaxrs/importmodel of the component Personal Profile Page. Performing manipulation of the argument description/applicationName/queryName results in cross site scripting. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

AI-Powered Analysis

AILast updated: 08/31/2025, 17:02:48 UTC

Technical Analysis

CVE-2025-9737 is a cross-site scripting (XSS) vulnerability identified in the O2OA platform, specifically affecting versions up to 10.0-410. The vulnerability resides in an unspecified function within the file /x_query_assemble_designer/jaxrs/importmodel, which is part of the Personal Profile Page component. The issue arises due to insufficient sanitization or validation of user-supplied input in the parameters description, applicationName, or queryName. An attacker can manipulate these arguments to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., by visiting a crafted URL or interacting with a maliciously crafted page). The vendor has acknowledged the issue and indicated that a fix will be included in a forthcoming version, but as of the publication date, no official patch is available. The CVSS v4.0 base score is 5.1, reflecting a medium severity level. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The vulnerability primarily threatens the confidentiality and integrity of user sessions and data by enabling attackers to steal cookies, perform actions on behalf of users, or deliver further malicious payloads.

Potential Impact

For European organizations using O2OA, this XSS vulnerability poses a moderate risk. Exploitation could lead to session hijacking, unauthorized actions within the affected application, and potential lateral movement if the attacker leverages the compromised session to access sensitive data or internal resources. Since O2OA is a collaboration and office automation platform, the exposure of personal profile pages to XSS attacks could result in leakage of personal or corporate information. The medium severity score indicates that while the vulnerability is not critical, it can still disrupt business operations, damage user trust, and potentially lead to compliance issues under GDPR if personal data is compromised. The public availability of exploit code increases the urgency for mitigation, especially in sectors with high regulatory scrutiny or where O2OA is integrated with other critical systems.

Mitigation Recommendations

Organizations should immediately implement input validation and output encoding controls on the affected parameters (description, applicationName, queryName) within O2OA, if possible, through configuration or temporary code adjustments. Employing Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting these parameters can provide interim protection. Monitoring web logs for unusual parameter values or script injection attempts is recommended to detect exploitation attempts early. Organizations should prioritize upgrading to the vendor's fixed version once released. Additionally, educating users to avoid clicking on suspicious links related to O2OA and enforcing strict Content Security Policies (CSP) can reduce the impact of XSS attacks. Regular security assessments and penetration testing focused on web application inputs should be conducted to identify similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-30T16:41:00.526Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b47cb1ad5a09ad00bf5da6

Added to database: 8/31/2025, 4:47:45 PM

Last enriched: 8/31/2025, 5:02:48 PM

Last updated: 8/31/2025, 7:02:40 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats