Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-68917 β€” AI Deep Analysis Summary

CVSS 6.4 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Vulnerability Essence**: The comment editing `textarea` in ONLYOFFICE Docs < 9.2.1 has a **Cross-Site Scripting (XSS)** issue.…

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: - **Flaw Point**: The `textarea` in the comment editing form does not properly filter input. - **Corresponding CWE**: CWE-79 (Cross-Site Scripting).

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected Scope**: - **Version**: ONLYOFFICE Docs versions **prior to 9.2.1**. - **Component**: Comment editing feature (`textarea`).

Q4What can hackers do? (Privileges/Data)

⚠️ **Attacker Capabilities**: - **Required Privilege**: **Regular user (PR:L)** can trigger it. - **Can Obtain**: Sensitive data of current user (e.g., Cookie, Token).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Exploitation Difficulty**: **Low**! - βœ… No special privileges needed (regular logged-in user is sufficient). - βœ… No complex configuration required. - ❌ UI interaction not necessary (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ§ͺ **Existing Exploit**: - **PoC**: No public code available (pocs: []). - **In-the-wild Exploitation**: Not mentioned β†’ not found yet.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check Method**: - Check if version < 9.2.1? 🚨 High risk. - Test whether the comment section `textarea` filters tags like `<script>`.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Official Fix**: - βœ… Fixed in version **9.2.1**. - πŸ”— Reference: [CHANGELOG](https://github.com/ONLYOFFICE/DocumentServer/blob/master/CHANGELOG.md#921)

Q9What if no patch? (Workaround)

⏳ **Temporary Workaround Without Patch**: - 🚫 Restrict or disable public commenting. - πŸ” Enforce HTML escaping of input content (WAF/middleware layer). - πŸ‘€ Strengthen output rendering security checks.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **High**! - CVSS 3.1: **5.4** (Medium), but affects multiple users & is easy to exploit. - πŸ’‘ Recommend immediate upgrade to β‰₯ 9.2.1 or implement mitigation measures.