CVE-2025-9931: Cross Site Scripting in Jinher OA
A vulnerability was detected in Jinher OA 1.0. Affected is an unknown function of the file /jc6/platform/sys/login!changePassWord.action of the component POST Request Handler. The manipulation of the argument Account results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-9931 is a medium-severity cross-site scripting (XSS) vulnerability identified in Jinher OA version 1.0, specifically within the POST request handler of the /jc6/platform/sys/login!changePassWord.action endpoint. The vulnerability arises from improper sanitization or validation of the 'Account' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an unauthenticated remote attacker to craft a specially crafted POST request that, when processed by the vulnerable endpoint, results in the execution of arbitrary JavaScript code in the context of the victim's browser session. The vulnerability does not require any privileges or authentication, and user interaction is necessary for the malicious script to execute, typically when a user accesses a compromised or maliciously crafted page. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with an attack vector of network, low attack complexity, no privileges required, and user interaction needed. The impact primarily affects the confidentiality and integrity of user data within the affected Jinher OA application, potentially enabling session hijacking, credential theft, or unauthorized actions performed on behalf of the user. No official patches or mitigations have been published at the time of disclosure, and while no known exploits are reported in the wild, the exploit code is publicly available, increasing the risk of exploitation.
Potential Impact
For European organizations using Jinher OA 1.0, this vulnerability poses a tangible risk to the security of internal office automation systems. Successful exploitation could lead to unauthorized access to sensitive corporate information, session hijacking, or the execution of malicious actions within the application context. This can disrupt business operations, lead to data breaches, and damage organizational reputation. Since Jinher OA is used for office automation, including potentially managing internal communications, workflows, and document handling, exploitation could expose confidential business data or facilitate further lateral movement within the corporate network. The requirement for user interaction means phishing or social engineering could be leveraged to trigger the attack, increasing the risk to employees. The medium severity suggests that while the vulnerability is not critical, it still warrants prompt attention to prevent exploitation, especially given the public availability of exploit code.
Mitigation Recommendations
1. Immediate mitigation should include implementing strict input validation and output encoding on the 'Account' parameter within the /jc6/platform/sys/login!changePassWord.action endpoint to neutralize malicious script content. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3. Conduct user awareness training to recognize and avoid phishing attempts that could deliver malicious payloads exploiting this vulnerability. 4. Monitor web server and application logs for suspicious POST requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5. If possible, restrict access to the affected endpoint via network controls or web application firewalls (WAF) with custom rules to block malicious payloads targeting the 'Account' parameter. 6. Engage with Jinher or the software vendor for official patches or updates and plan for prompt deployment once available. 7. Consider upgrading to a newer, unaffected version of Jinher OA if available. 8. Regularly review and update security policies around web application security and incident response to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-9931: Cross Site Scripting in Jinher OA
Description
A vulnerability was detected in Jinher OA 1.0. Affected is an unknown function of the file /jc6/platform/sys/login!changePassWord.action of the component POST Request Handler. The manipulation of the argument Account results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9931 is a medium-severity cross-site scripting (XSS) vulnerability identified in Jinher OA version 1.0, specifically within the POST request handler of the /jc6/platform/sys/login!changePassWord.action endpoint. The vulnerability arises from improper sanitization or validation of the 'Account' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an unauthenticated remote attacker to craft a specially crafted POST request that, when processed by the vulnerable endpoint, results in the execution of arbitrary JavaScript code in the context of the victim's browser session. The vulnerability does not require any privileges or authentication, and user interaction is necessary for the malicious script to execute, typically when a user accesses a compromised or maliciously crafted page. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with an attack vector of network, low attack complexity, no privileges required, and user interaction needed. The impact primarily affects the confidentiality and integrity of user data within the affected Jinher OA application, potentially enabling session hijacking, credential theft, or unauthorized actions performed on behalf of the user. No official patches or mitigations have been published at the time of disclosure, and while no known exploits are reported in the wild, the exploit code is publicly available, increasing the risk of exploitation.
Potential Impact
For European organizations using Jinher OA 1.0, this vulnerability poses a tangible risk to the security of internal office automation systems. Successful exploitation could lead to unauthorized access to sensitive corporate information, session hijacking, or the execution of malicious actions within the application context. This can disrupt business operations, lead to data breaches, and damage organizational reputation. Since Jinher OA is used for office automation, including potentially managing internal communications, workflows, and document handling, exploitation could expose confidential business data or facilitate further lateral movement within the corporate network. The requirement for user interaction means phishing or social engineering could be leveraged to trigger the attack, increasing the risk to employees. The medium severity suggests that while the vulnerability is not critical, it still warrants prompt attention to prevent exploitation, especially given the public availability of exploit code.
Mitigation Recommendations
1. Immediate mitigation should include implementing strict input validation and output encoding on the 'Account' parameter within the /jc6/platform/sys/login!changePassWord.action endpoint to neutralize malicious script content. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3. Conduct user awareness training to recognize and avoid phishing attempts that could deliver malicious payloads exploiting this vulnerability. 4. Monitor web server and application logs for suspicious POST requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5. If possible, restrict access to the affected endpoint via network controls or web application firewalls (WAF) with custom rules to block malicious payloads targeting the 'Account' parameter. 6. Engage with Jinher or the software vendor for official patches or updates and plan for prompt deployment once available. 7. Consider upgrading to a newer, unaffected version of Jinher OA if available. 8. Regularly review and update security policies around web application security and incident response to quickly address any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-03T11:28:33.788Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b8be8cad5a09ad00fb1d28
Added to database: 9/3/2025, 10:17:48 PM
Last enriched: 9/3/2025, 10:32:58 PM
Last updated: 9/4/2025, 12:34:40 AM
Views: 4
Related Threats
CVE-2025-9940: Cross Site Scripting in CodeAstro Real Estate Management System
MediumCVE-2025-9939: Cross Site Scripting in CodeAstro Real Estate Management System
MediumCVE-2025-58355: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in charmbracelet soft-serve
HighCVE-2025-9938: Stack-based Buffer Overflow in D-Link DI-8400
HighCVE-2025-9937: Improper Authorization in elunez eladmin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.