Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-5301— Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer)

EPSS 7.88% · P92
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-5301

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer)
Source: NVD (National Vulnerability Database)
Vulnerability Description
ONLYOFFICE Docs (DocumentServer) in versions equal and below 8.3.1 are affected by a reflected cross-site scripting (XSS) issue when opening files via the WOPI protocol. Attackers could inject malicious scripts via crafted HTTP POST requests, which are then reflected in the server's HTML response.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
ONLYOFFICE Docs 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ONLYOFFICE Docs是ONLYOFFICE公司的一款在线办公软件。 ONLYOFFICE Docs 8.3.1及之前版本存在安全漏洞,该漏洞源于通过WOPI协议打开文件时存在反射型跨站脚本,可能导致执行恶意脚本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OnlyOfficeDocs (DocumentServer) <=8.3.1 -

II. Public POCs for CVE-2025-5301

#POC DescriptionSource LinkShenlong Link
1ONLYOFFICE Docs (DocumentServer) <= 8.3.1 contains a reflected XSS caused by improper sanitization of crafted HTTP POST requests via the WOPI protocol, letting attackers inject malicious scripts reflected in HTML response, exploit requires crafted POST requests. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5301.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-5301

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-5301

No comments yet


Leave a comment