Skip to content

Blind Stored XSS in Phone Number Field Enables Forced Redirect and Unauthorized Actions

High
mschering published GHSA-phhq-3h8f-qxpx May 22, 2025

Package

No package listed

Affected versions

<=6.8.118, 20.0.119

Patched versions

>=6.8.119, 25.0.20

Description

Summary

A stored and blind XSS vulnerability exists in the Phone Number field of the user profile within the GroupOffice application. This allows a malicious actor to inject persistent JavaScript payloads, which are triggered in the context of another user when they view the Address Book. Successful exploitation enables actions such as forced redirects, unauthorized fetch requests, or other arbitrary JavaScript execution—without user interaction.

Affected Component

  • Phone Number Field in User Profile > Communication

Vulnerability Type

  • Stored Cross-Site Scripting (XSS)
  • Blind XSS

Steps to Reproduce (PoC)

  1. Login as Admin

    • Navigate to System Settings > Users.
    • Add two users: user1 and user2 using the +Add button.
  2. Inject XSS Payload

    • Logout from admin and login as user1.

    • Go to My Account > Profile > Communication.

    • Click Add Phone Number and insert the following payload:

      <img src=0 onerror="window.location='#summary'">
    • Save the entry.

  3. Trigger Blind XSS

    • Logout and login as user2.
    • Navigate to the Address Book.
    • The stored XSS payload is executed automatically, causing a redirect to the #summary URL fragment.

Impact

  • Forced Redirects
    Users are redirected to unintended fragments or pages without their knowledge.

  • Unauthorized Fetch Requests
    Using <img onerror> or other techniques, an attacker can send background requests from the user’s browser to external domains or internal endpoints.

  • Data Theft / Session Hijacking / Account Manipulation
    With a more advanced payload, an attacker could exfiltrate session data or perform actions on behalf of users.

  • Wide Impact Across Users
    As phone numbers are visible in the Address Book, any user who views the malicious phone number will trigger the payload, making it highly scalable.

Recommendation

  • Input Validation & Output Encoding
    Sanitize input on all fields, especially those rendered to other users. Escape or encode HTML entities before rendering.

Severity

High

CVE ID

CVE-2025-48366

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

Improper Neutralization of Alternate XSS Syntax

The product does not neutralize or incorrectly neutralizes user-controlled input for alternate script syntax. Learn more on MITRE.

Credits