The comment editing template (dzz/comment/template/edit_form.htm) in DzzOffice 2.3.x lacks adequate security escaping for user-controllable data in multiple contexts, including HTML and JavaScript strings. This allows low-privilege attackers to construct comment content or request parameters and execute arbitrary JavaScript code when the victim opens the editing pop-up.
References
| Link | Resource |
|---|---|
| https://github.com/Yohane-Mashiro/dzzoffice_xss | Issue Tracking Third Party Advisory |
| https://github.com/zyx0814/dzzoffice/issues/363 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
20 Nov 2025, 20:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Yohane-Mashiro/dzzoffice_xss - Issue Tracking, Third Party Advisory | |
| References | () https://github.com/zyx0814/dzzoffice/issues/363 - Exploit, Issue Tracking, Third Party Advisory |
20 Nov 2025, 17:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Yohane-Mashiro/dzzoffice_xss - Issue Tracking, Vendor Advisory | |
| References | () https://github.com/zyx0814/dzzoffice/issues/363 - Exploit, Third Party Advisory, Issue Tracking | |
| First Time |
Dzzoffice
Dzzoffice dzzoffice |
|
| CPE | cpe:2.3:a:dzzoffice:dzzoffice:*:*:*:*:*:*:*:* |
19 Nov 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| CWE | CWE-94 |
18 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 19:15
Updated : 2025-11-20 20:07
NVD link : CVE-2025-63693
Mitre link : CVE-2025-63693
CVE.ORG link : CVE-2025-63693
JSON object : View
Products Affected
dzzoffice
- dzzoffice
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
