Skip to content

Stored XSS Vulnerability via user's name field

Moderate
mschering published GHSA-j7p3-v652-p3gf Mar 6, 2025

Package

No package listed

Affected versions

6.8.99

Patched versions

6.8.100

Description

Summary

During the vulnerability analysis on Group Office I observed a Stored Cross Site Scripting present in version 6.8.99 where a user can
change his/her name as malicious JavaScript payload which is execute on history.

Details

This Stored XSS vulnerability exists where user input in the Name field is not properly sanitized before being stored.

PoC

  1. Login to Group Office portal as user change your name as payload <img src=0xadik onerror=alert("XSS")>.
  2. From another browser login as admin and navigate to History.
  3. Click the Changes column to view what changes; the malicious JavaScript code will execute.

Impact

This can lead to various security risks, including session hijacking, phishing attacks and malware distribution. History page visible to administrative user and when an administrator views the infected page, the attacker may gain elevated privileges, further compromising the system.

Severity

Moderate

CVE ID

CVE-2025-25191

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

Credits