Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 20 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:dzzoffice:dzzoffice:*:*:*:*:*:*:*:* |
Thu, 20 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dzzoffice
Dzzoffice dzzoffice |
|
| Vendors & Products |
Dzzoffice
Dzzoffice dzzoffice |
Wed, 19 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Tue, 18 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The comment editing template (dzz/comment/template/edit_form.htm) in DzzOffice 2.3.x lacks adequate security escaping for user-controllable data in multiple contexts, including HTML and JavaScript strings. This allows low-privilege attackers to construct comment content or request parameters and execute arbitrary JavaScript code when the victim opens the editing pop-up. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-19T14:41:00.438Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63693
Updated: 2025-11-19T14:40:41.986Z
Status : Analyzed
Published: 2025-11-18T19:15:50.983
Modified: 2025-11-20T20:07:18.850
Link: CVE-2025-63693
No data.
OpenCVE Enrichment
Updated: 2025-11-20T10:30:45Z