The comment editing template (dzz/comment/template/edit_form.htm) in DzzOffice 2.3.x lacks adequate security escaping for user-controllable data in multiple contexts, including HTML and JavaScript strings. This allows low-privilege attackers to construct comment content or request parameters and execute arbitrary JavaScript code when the victim opens the editing pop-up.
References
| Link | Resource |
|---|---|
| https://github.com/Yohane-Mashiro/dzzoffice_xss | Issue Tracking Third Party Advisory |
| https://github.com/zyx0814/dzzoffice/issues/363 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-11-18 19:15
Updated : 2025-11-20 20:07
NVD link : CVE-2025-63693
Mitre link : CVE-2025-63693
CVE.ORG link : CVE-2025-63693
JSON object : View
Products Affected
dzzoffice
- dzzoffice
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
