CVE-2025-3390

A vulnerability, which was classified as problematic, was found in hailey888 oa_system up to 2025.01.01. Affected is the function addandchangeday of the file cn/gson/oass/controller/daymanager/DaymanageController.java of the component Backend. The manipulation of the argument scheduleList leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
References
Link Resource
https://gitee.com/hailey888/oa_system/issues/IBRRZX Exploit Issue Tracking
https://vuldb.com/?ctiid.303636 Permissions Required VDB Entry
https://vuldb.com/?id.303636 Third Party Advisory VDB Entry
https://gitee.com/hailey888/oa_system/issues/IBRRZX Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:hailey888:oa_system:*:*:*:*:*:*:*:*

History

07 May 2025, 17:21

Type Values Removed Values Added
First Time Hailey888 oa System
Hailey888
References () https://gitee.com/hailey888/oa_system/issues/IBRRZX - () https://gitee.com/hailey888/oa_system/issues/IBRRZX - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.303636 - () https://vuldb.com/?ctiid.303636 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.303636 - () https://vuldb.com/?id.303636 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:hailey888:oa_system:*:*:*:*:*:*:*:*

08 Apr 2025, 14:15

Type Values Removed Values Added
References () https://gitee.com/hailey888/oa_system/issues/IBRRZX - () https://gitee.com/hailey888/oa_system/issues/IBRRZX -
Summary
  • (es) Se encontró una vulnerabilidad clasificada como problemática en hailey888 oa_system hasta la versión 2025.01.01. La función addandchangeday del archivo cn/gson/oass/controller/daymanager/DaymanageController.java del componente Backend se ve afectada. La manipulación del argumento "scheduleList" provoca ataques de cross site scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado. Este producto utiliza una versión continua para garantizar una distribución continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas.

08 Apr 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-08 00:15

Updated : 2025-05-07 17:21


NVD link : CVE-2025-3390

Mitre link : CVE-2025-3390

CVE.ORG link : CVE-2025-3390


JSON object : View

Products Affected

hailey888

  • oa_system
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')