Home

Description

EN DE

A security vulnerability has been detected in O2OA up to 10.0-410. This impacts an unknown function of the file /x_query_assemble_designer/jaxrs/statement of the component Personal Profile Page. Such manipulation of the argument description/queryName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."

In O2OA bis 10.0-410 ist eine Schwachstelle entdeckt worden. Betroffen ist eine unbekannte Funktion der Datei /x_query_assemble_designer/jaxrs/statement der Komponente Personal Profile Page. Durch das Manipulieren des Arguments description/queryName mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz möglich. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-08-30 | Published 2025-08-31 | Updated 2025-09-02 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C
LOW: 3.5CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C
4.0AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:C

Problem types

Cross Site Scripting

Code Injection

Timeline

2025-08-30:Advisory disclosed
2025-08-30:VulDB entry created
2025-08-30:VulDB entry last update

Credits

colorfullbz (VulDB User) reporter

References

vuldb.com/?id.322035 (VDB-322035 | O2OA Personal Profile statement cross site scripting) vdb-entry technical-description

vuldb.com/?ctiid.322035 (VDB-322035 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.637250 (Submit #637250 | o2oa ≤ 10.0-410-g3d5e0d2 XSS) third-party-advisory

github.com/o2oa/o2oa/issues/188 issue-tracking

github.com/o2oa/o2oa/issues/188 issue-tracking

github.com/o2oa/o2oa/issues/188 exploit issue-tracking

cve.org (CVE-2025-9736)

nvd.nist.gov (CVE-2025-9736)

Download JSON