O2OA जोपर्यंत 10.0-410 Personal Profile Page form name/alias/description क्रॉस साइट स्क्रिप्टिंग

एक कमकुवतपणा जो समस्याग्रस्त म्हणून वर्गीकृत केला आहे, तो O2OA जोपर्यंत 10.0-410 मध्ये आढळून आला आहे. या ठिकाणी परिणाम झाला आहे अज्ञात फंक्शन फाइल /x_processplatform_assemble_designer/jaxrs/form च्या घटक Personal Profile Page च्या. सॉफ्टवेअरमध्ये name/alias/description या आर्ग्युमेंटचे केलेले बदल क्रॉस साइट स्क्रिप्टिंग यास कारणीभूत ठरतात. समस्या जाहीर करण्यासाठी CWE वापरल्यास CWE-79 येथे नेले जाते. ही कमतरता प्रसिद्ध करण्यात आली होती 30/08/2025 म्हणून 182. डाउनलोडसाठी सल्ला github.com वर शेअर केला आहे. ही दुर्बलता CVE-2025-9716 म्हणून ओळखली जाते. दूरवरून हा हल्ला घडवून आणता येतो. तांत्रिक तपशील दिलेले आहेत. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषण सार्वजनिकपणे जाहीर झाले आहे आणि त्याचा वापर होऊ शकतो. सध्या USD $0-$5k इतका असू शकतो. MITRE ATT&CK प्रकल्प T1059.007 हल्ला तंत्रज्ञान म्हणून घोषित करतो. प्रूफ-ऑफ-कॉन्सेप्ट म्हणून हे घोषित केले गेले आहे. शोषण डाउनलोडसाठी github.com येथे शेअर केले आहे. 0-डे म्हणून त्याची अंदाजे भूमिगत किंमत $0-$5k होती. If you want to get best quality of vulnerability data, you may have to visit VulDB.

4 बदल · 100 डेटा पॉइंट्स

शेततयार केली
30/08/2025 01:10 PM
अद्ययावत 1/3
31/08/2025 09:47 AM
अद्ययावत 2/3
31/08/2025 10:46 AM
अद्ययावत 3/3
12/09/2025 03:40 AM
cna_responsibleVulDBVulDBVulDBVulDB
response_summaryThe vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
software_nameO2OAO2OAO2OAO2OA
software_version<=10.0-410<=10.0-410<=10.0-410<=10.0-410
software_componentPersonal Profile PagePersonal Profile PagePersonal Profile PagePersonal Profile Page
software_file/x_processplatform_assemble_designer/jaxrs/form/x_processplatform_assemble_designer/jaxrs/form/x_processplatform_assemble_designer/jaxrs/form/x_processplatform_assemble_designer/jaxrs/form
software_argumentname/alias/descriptionname/alias/descriptionname/alias/descriptionname/alias/description
vulnerability_cweCWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iLLLL
cvss3_vuldb_aNNNN
cvss3_vuldb_ePPPP
cvss3_vuldb_rcCCCC
advisory_identifier182182182182
advisory_urlhttps://github.com/o2oa/o2oa/issues/182https://github.com/o2oa/o2oa/issues/182https://github.com/o2oa/o2oa/issues/182https://github.com/o2oa/o2oa/issues/182
advisory_confirm_urlhttps://github.com/o2oa/o2oa/issues/182#issuecomment-3212879158https://github.com/o2oa/o2oa/issues/182#issuecomment-3212879158https://github.com/o2oa/o2oa/issues/182#issuecomment-3212879158https://github.com/o2oa/o2oa/issues/182#issuecomment-3212879158
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/o2oa/o2oa/issues/182#issue-3332970310https://github.com/o2oa/o2oa/issues/182#issue-3332970310https://github.com/o2oa/o2oa/issues/182#issue-3332970310https://github.com/o2oa/o2oa/issues/182#issue-3332970310
source_cveCVE-2025-9716CVE-2025-9716CVE-2025-9716CVE-2025-9716
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiNNNN
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcCCCC
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_prLLLL
cvss4_vuldb_uiPPPP
cvss4_vuldb_vcNNNN
cvss4_vuldb_viLLLL
cvss4_vuldb_vaNNNN
cvss4_vuldb_ePPPP
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore4.04.04.04.0
cvss2_vuldb_tempscore3.63.63.63.6
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.33.33.33.3
cvss3_meta_basescore3.53.53.54.1
cvss3_meta_tempscore3.33.33.44.1
cvss4_vuldb_bscore5.15.15.15.1
cvss4_vuldb_btscore2.02.02.02.0
advisory_date1756504800 (30/08/2025)1756504800 (30/08/2025)1756504800 (30/08/2025)1756504800 (30/08/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-26285EUVD-2025-26285EUVD-2025-26285
cve_nvd_summaryA vulnerability was determined in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_processplatform_assemble_designer/jaxrs/form of the component Personal Profile Page. This manipulation of the argument name/alias/description causes cross site scripting. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."A vulnerability was determined in O2OA up to 10.0-410. Affected by this vulnerability is an unknown functionality of the file /x_processplatform_assemble_designer/jaxrs/form of the component Personal Profile Page. This manipulation of the argument name/alias/description causes cross site scripting. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
cvss4_cna_avNN
cvss4_cna_acLL
cvss4_cna_atNN
cvss4_cna_prLL
cvss4_cna_uiPP
cvss4_cna_vcNN
cvss4_cna_viLL
cvss4_cna_vaNN
cvss4_cna_scNN
cvss4_cna_siNN
cvss4_cna_saNN
cvss4_cna_bscore5.15.1
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiRR
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iLL
cvss3_cna_aNN
cvss3_cna_basescore3.53.5
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auSS
cvss2_cna_ciNN
cvss2_cna_iiPP
cvss2_cna_aiNN
cvss2_cna_basescore44
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_nvd_basescore5.4

Do you want to use VulDB in your project?

Use the official API to access entries easily!