CVE-2025-63693
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-11-20
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dzzoffice | dzzoffice | to 2.3.7 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the comment editing template of DzzOffice 2.3.x, where user-controllable data is not properly escaped in multiple contexts such as HTML and JavaScript strings. This flaw allows low-privilege attackers to craft comment content or request parameters that execute arbitrary JavaScript code when a victim opens the editing pop-up.
How can this vulnerability impact me? :
The vulnerability can lead to arbitrary JavaScript code execution in the context of the victim's browser. This can result in unauthorized actions, data theft, session hijacking, or other malicious activities performed by an attacker with low privileges.