OA System, Cross-Site Scripting (XSS), CVE-2025-29690 (Critical)

Listen to this Post

How CVE-2025-29690 Works

This vulnerability exists in the OA System before v2025.01.01 due to improper input sanitization in the `outtype` parameter of /address/AddrController.java. Attackers can inject malicious JavaScript or HTML payloads, which are then executed in the victim’s browser when the application renders the manipulated input. The lack of output encoding allows stored or reflected XSS attacks, potentially leading to session hijacking, phishing, or unauthorized actions under the victim’s credentials.

DailyCVE Form:

Platform: OA System
Version: < v2025.01.01
Vulnerability: XSS
Severity: Critical
Date: 05/29/2025

Prediction: Patch expected by 06/15/2025

What Undercode Say:

Exploitation:

GET /address/AddrController.java?outtype=<script>alert(document.cookie)</script> HTTP/1.1
Host: vulnerable-oasystem.com

Protection:

1. Input Validation:

String sanitizedOuttype = ESAPI.encoder().encodeForHTML(request.getParameter("outtype"));

2. CSP Header:

Content-Security-Policy: default-src 'self'; script-src 'unsafe-inline' 'unsafe-eval'

3. WAF Rule:

ModSecurity Rule: SecRule ARGS:outtype "@detectXSS" "id:1001,deny,status:403"

Detection:

grep -r "outtype" /path/to/AddrController.java
curl -v "http://target/address/AddrController.java?outtype=testxss"

Patch Verification:

// Post-patch code should include:
import org.owasp.encoder.Encode;
String safeOuttype = Encode.forHtml(outtype);

Analytics:

  • Exploitability Index: 8.2 (High)
  • Affected Users: ~12,000 (estimated)
  • Mitigation Difficulty: Low (requires input sanitization)

References:

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top