A vulnerability was identified in O2OA up to 10.0-410. Affected by this issue is some unknown functionality of the file /x_organization_assemble_control/jaxrs/unit/ of the component Personal Profile Page. Such manipulation of the argument name/shortName/distinguishedName/pinyin/pinyinInitial/levelName leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://github.com/o2oa/o2oa/issues/183 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/o2oa/o2oa/issues/183#issue-3332973239 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.322005 | Permissions Required VDB Entry |
| https://vuldb.com/?id.322005 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.637245 | Third Party Advisory VDB Entry |
| https://github.com/o2oa/o2oa/issues/183 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/o2oa/o2oa/issues/183#issue-3332973239 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-08-31 05:15
Updated : 2025-09-09 19:11
NVD link : CVE-2025-9717
Mitre link : CVE-2025-9717
CVE.ORG link : CVE-2025-9717
JSON object : View
Products Affected
zoneland
- o2oa
