CVE-2025-63693

The comment editing template (dzz/comment/template/edit_form.htm) in DzzOffice 2.3.x lacks adequate security escaping for user-controllable data in multiple contexts, including HTML and JavaScript strings. This allows low-privilege attackers to construct comment content or request parameters and execute arbitrary JavaScript code when the victim opens the editing pop-up.
References
Link Resource
https://github.com/Yohane-Mashiro/dzzoffice_xss Issue Tracking Third Party Advisory
https://github.com/zyx0814/dzzoffice/issues/363 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:dzzoffice:dzzoffice:*:*:*:*:*:*:*:*

History

20 Nov 2025, 20:07

Type Values Removed Values Added
References () https://github.com/Yohane-Mashiro/dzzoffice_xss - Issue Tracking, Vendor Advisory () https://github.com/Yohane-Mashiro/dzzoffice_xss - Issue Tracking, Third Party Advisory
References () https://github.com/zyx0814/dzzoffice/issues/363 - Exploit, Third Party Advisory, Issue Tracking () https://github.com/zyx0814/dzzoffice/issues/363 - Exploit, Issue Tracking, Third Party Advisory

20 Nov 2025, 17:35

Type Values Removed Values Added
References () https://github.com/Yohane-Mashiro/dzzoffice_xss - () https://github.com/Yohane-Mashiro/dzzoffice_xss - Issue Tracking, Vendor Advisory
References () https://github.com/zyx0814/dzzoffice/issues/363 - () https://github.com/zyx0814/dzzoffice/issues/363 - Exploit, Third Party Advisory, Issue Tracking
First Time Dzzoffice
Dzzoffice dzzoffice
CPE cpe:2.3:a:dzzoffice:dzzoffice:*:*:*:*:*:*:*:*

19 Nov 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CWE CWE-94

18 Nov 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 19:15

Updated : 2025-11-20 20:07


NVD link : CVE-2025-63693

Mitre link : CVE-2025-63693

CVE.ORG link : CVE-2025-63693


JSON object : View

Products Affected

dzzoffice

  • dzzoffice
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')