A vulnerability was found in O2OA up to 10.0-410. Affected is an unknown function of the file /x_cms_assemble_control/jaxrs/script of the component Personal Profile Page. The manipulation of the argument name/alias/description results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
References
Link | Resource |
---|---|
https://github.com/o2oa/o2oa/issues/181 | Exploit Issue Tracking Vendor Advisory |
https://github.com/o2oa/o2oa/issues/181#issue-3332967944 | Exploit Issue Tracking Vendor Advisory |
https://github.com/o2oa/o2oa/issues/181#issuecomment-3212879547 | Exploit Issue Tracking Vendor Advisory |
https://vuldb.com/?ctiid.322003 | Permissions Required VDB Entry |
https://vuldb.com/?id.322003 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.637243 | Third Party Advisory VDB Entry |
https://github.com/o2oa/o2oa/issues/181 | Exploit Issue Tracking Vendor Advisory |
https://github.com/o2oa/o2oa/issues/181#issue-3332967944 | Exploit Issue Tracking Vendor Advisory |
https://github.com/o2oa/o2oa/issues/181#issuecomment-3212879547 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
10 Sep 2025, 15:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/o2oa/o2oa/issues/181 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/o2oa/o2oa/issues/181#issue-3332967944 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/o2oa/o2oa/issues/181#issuecomment-3212879547 - Exploit, Issue Tracking, Vendor Advisory |
10 Sep 2025, 12:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/o2oa/o2oa/issues/181 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/o2oa/o2oa/issues/181#issue-3332967944 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/o2oa/o2oa/issues/181#issuecomment-3212879547 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.322003 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.322003 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.637243 - Third Party Advisory, VDB Entry | |
First Time |
Zoneland
Zoneland o2oa |
|
CPE | cpe:2.3:a:zoneland:o2oa:*:*:*:*:*:*:*:* |
02 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/o2oa/o2oa/issues/181 - | |
References | () https://github.com/o2oa/o2oa/issues/181#issue-3332967944 - | |
References | () https://github.com/o2oa/o2oa/issues/181#issuecomment-3212879547 - |
31 Aug 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-31 01:15
Updated : 2025-09-10 15:07
NVD link : CVE-2025-9715
Mitre link : CVE-2025-9715
CVE.ORG link : CVE-2025-9715
JSON object : View
Products Affected
zoneland
- o2oa