Skip to content

Stored XSS Vulnerability via user's name field

Moderate
mschering published GHSA-j7p3-v652-p3gf Mar 6, 2025

Package

No package listed

Affected versions

6.8.99

Patched versions

6.8.100

Description

Summary

During the vulnerability analysis on Group Office I observed a Stored Cross Site Scripting present in version 6.8.99 where a user can
change his/her name as malicious JavaScript payload which is execute on history.

Details

This Stored XSS vulnerability exists where user input in the Name field is not properly sanitized before being stored.

PoC

  1. Login to Group Office portal as user change your name as payload <img src=0xadik onerror=alert("XSS")>.
  2. From another browser login as admin and navigate to History.
  3. Click the Changes column to view what changes; the malicious JavaScript code will execute.

Impact

This can lead to various security risks, including session hijacking, phishing attacks and malware distribution. History page visible to administrative user and when an administrator views the infected page, the attacker may gain elevated privileges, further compromising the system.

Severity

Moderate

CVE ID

CVE-2025-25191

Weaknesses

Credits