Description
A weakness has been identified in o2oa up to 10.0. This affects the function FileAction of the file FileAction.java of the component URL Fetching. Executing a manipulation of the argument fileUrl can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Timeline
| 2026-04-28: | Advisory disclosed |
| 2026-04-28: | VulDB entry created |
| 2026-04-28: | VulDB entry last update |
Credits
larlarua (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/359951 (VDB-359951 | o2oa URL Fetching FileAction.java FileAction server-side request forgery)
vuldb.com/vuln/359951/cti (VDB-359951 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/803073 (Submit #803073 | o2oa https://github.com/o2oa/o2oa 10.0 Server-Side Request Forgery)
github.com/o2oa/o2oa/issues/195
github.com/o2oa/o2oa/