A vulnerability has been found in O2OA up to 10.0-410. The affected element is an unknown function of the file /x_portal_assemble_designer/jaxrs/widget of the component Personal Profile Page. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
References
Link | Resource |
---|---|
https://github.com/o2oa/o2oa/issues/175 | Exploit Issue Tracking Vendor Advisory |
https://github.com/o2oa/o2oa/issues/175#issue-3332931249 | Exploit Issue Tracking Vendor Advisory |
https://github.com/o2oa/o2oa/issues/175#issuecomment-3212881171 | Issue Tracking |
https://vuldb.com/?ctiid.321867 | Permissions Required VDB Entry |
https://vuldb.com/?id.321867 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.637235 | Third Party Advisory VDB Entry |
Configurations
History
16 Sep 2025, 16:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:zoneland:o2oa:*:*:*:*:*:*:*:* | |
First Time |
Zoneland
Zoneland o2oa |
|
References | () https://github.com/o2oa/o2oa/issues/175 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/o2oa/o2oa/issues/175#issue-3332931249 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/o2oa/o2oa/issues/175#issuecomment-3212881171 - Issue Tracking | |
References | () https://vuldb.com/?ctiid.321867 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.321867 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.637235 - Third Party Advisory, VDB Entry |
29 Aug 2025, 16:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-29 16:15
Updated : 2025-09-16 16:19
NVD link : CVE-2025-9659
Mitre link : CVE-2025-9659
CVE.ORG link : CVE-2025-9659
JSON object : View
Products Affected
zoneland
- o2oa