CVE-2025-10254
BaseFortify
Publication date: 2025-09-11
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ascensio_system_sia | onlyoffice | 12.7.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a cross-site scripting (XSS) issue found in Ascensio System SIA OnlyOffice up to version 12.7.0. It occurs due to improper processing of the file /Products/Projects/Messages.aspx in the SVG Image Handler component. An attacker can remotely manipulate this to execute malicious scripts in the context of a user's browser.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to perform cross-site scripting attacks, which may lead to the execution of malicious scripts in a user's browser. This can result in unauthorized actions performed on behalf of the user, potential theft of session tokens or sensitive information, and could compromise user interactions with the affected application.
What immediate steps should I take to mitigate this vulnerability?
Since the vendor is working on patches to resolve this issue, the immediate mitigation step is to monitor for updates from Ascensio System SIA and apply the security patches as soon as they are released. Additionally, consider restricting access to the /Products/Projects/Messages.aspx component or implementing web application firewall (WAF) rules to block potential cross-site scripting attempts targeting the SVG Image Handler.