Skip to main content

CVE-2025-9931: Cross Site Scripting in Jinher OA

Medium
VulnerabilityCVE-2025-9931cvecve-2025-9931
Published: Wed Sep 03 2025 (09/03/2025, 22:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Jinher
Product: OA

Description

A vulnerability was detected in Jinher OA 1.0. Affected is an unknown function of the file /jc6/platform/sys/login!changePassWord.action of the component POST Request Handler. The manipulation of the argument Account results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/03/2025, 22:32:58 UTC

Technical Analysis

CVE-2025-9931 is a medium-severity cross-site scripting (XSS) vulnerability identified in Jinher OA version 1.0, specifically within the POST request handler of the /jc6/platform/sys/login!changePassWord.action endpoint. The vulnerability arises from improper sanitization or validation of the 'Account' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an unauthenticated remote attacker to craft a specially crafted POST request that, when processed by the vulnerable endpoint, results in the execution of arbitrary JavaScript code in the context of the victim's browser session. The vulnerability does not require any privileges or authentication, and user interaction is necessary for the malicious script to execute, typically when a user accesses a compromised or maliciously crafted page. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with an attack vector of network, low attack complexity, no privileges required, and user interaction needed. The impact primarily affects the confidentiality and integrity of user data within the affected Jinher OA application, potentially enabling session hijacking, credential theft, or unauthorized actions performed on behalf of the user. No official patches or mitigations have been published at the time of disclosure, and while no known exploits are reported in the wild, the exploit code is publicly available, increasing the risk of exploitation.

Potential Impact

For European organizations using Jinher OA 1.0, this vulnerability poses a tangible risk to the security of internal office automation systems. Successful exploitation could lead to unauthorized access to sensitive corporate information, session hijacking, or the execution of malicious actions within the application context. This can disrupt business operations, lead to data breaches, and damage organizational reputation. Since Jinher OA is used for office automation, including potentially managing internal communications, workflows, and document handling, exploitation could expose confidential business data or facilitate further lateral movement within the corporate network. The requirement for user interaction means phishing or social engineering could be leveraged to trigger the attack, increasing the risk to employees. The medium severity suggests that while the vulnerability is not critical, it still warrants prompt attention to prevent exploitation, especially given the public availability of exploit code.

Mitigation Recommendations

1. Immediate mitigation should include implementing strict input validation and output encoding on the 'Account' parameter within the /jc6/platform/sys/login!changePassWord.action endpoint to neutralize malicious script content. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3. Conduct user awareness training to recognize and avoid phishing attempts that could deliver malicious payloads exploiting this vulnerability. 4. Monitor web server and application logs for suspicious POST requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5. If possible, restrict access to the affected endpoint via network controls or web application firewalls (WAF) with custom rules to block malicious payloads targeting the 'Account' parameter. 6. Engage with Jinher or the software vendor for official patches or updates and plan for prompt deployment once available. 7. Consider upgrading to a newer, unaffected version of Jinher OA if available. 8. Regularly review and update security policies around web application security and incident response to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-03T11:28:33.788Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b8be8cad5a09ad00fb1d28

Added to database: 9/3/2025, 10:17:48 PM

Last enriched: 9/3/2025, 10:32:58 PM

Last updated: 9/4/2025, 12:34:40 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats