CVE-2025-3391

A vulnerability has been found in hailey888 oa_system up to 2025.01.01 and classified as problematic. Affected by this vulnerability is the function outAddress of the file cn/gson/oass/controller/address/AddrController. java of the component Backend. The manipulation of the argument outtype leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
References
Link Resource
https://gitee.com/hailey888/oa_system/issues/IBRRX3 Exploit Third Party Advisory Issue Tracking
https://gitee.com/hailey888/oa_system/issues/IBRRX3 Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.303637 Permissions Required VDB Entry
https://vuldb.com/?id.303637 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:hailey888:oa_system:*:*:*:*:*:*:*:*

History

07 May 2025, 17:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CWE CWE-79
References () https://vuldb.com/?ctiid.303637 - () https://vuldb.com/?ctiid.303637 - Permissions Required, VDB Entry
References () https://gitee.com/hailey888/oa_system/issues/IBRRX3 - () https://gitee.com/hailey888/oa_system/issues/IBRRX3 - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?id.303637 - () https://vuldb.com/?id.303637 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:hailey888:oa_system:*:*:*:*:*:*:*:*
First Time Hailey888 oa System
Hailey888

08 Apr 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 3.5
v2 : unknown
v3 : unknown
CWE CWE-94
CWE-79

08 Apr 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-08 01:15

Updated : 2025-05-07 17:16


NVD link : CVE-2025-3391

Mitre link : CVE-2025-3391


JSON object : View

Products Affected

hailey888

  • oa_system
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')