CVE-2025-30190

5.4 MEDIUM

📋 TL;DR

This vulnerability allows malicious Office documents to inject script code when edited, potentially executing unauthorized actions under the user's account. It affects users of Open-Xchange AppSuite who open untrusted documents. The impact includes potential data exfiltration and unauthorized system access.

💻 Affected Systems

Products:
  • Open-Xchange AppSuite
Versions: Specific versions not provided in advisory; check vendor documentation
Operating Systems: All platforms running Open-Xchange AppSuite
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction (opening/editing malicious document)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account compromise leading to data exfiltration, privilege escalation, and lateral movement within the organization.

🟠

Likely Case

Targeted phishing attacks delivering malicious documents that steal session cookies or sensitive data when opened by users.

🟢

If Mitigated

Limited impact with proper email filtering, user awareness training, and network segmentation containing the damage.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

No publicly available exploits known, but exploitation requires user to open malicious document

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Open-Xchange security advisory for specific patched versions

Vendor Advisory: https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2025/oxas-adv-2025-0003.json

Restart Required: Yes

Instructions:

1. Review Open-Xchange security advisory 2. Download latest patched version 3. Backup current installation 4. Apply patch following vendor instructions 5. Restart affected services 6. Verify patch application

🔧 Temporary Workarounds

Document Upload Restrictions

all

Restrict upload of Office documents from untrusted sources

User Awareness Training

all

Train users to avoid opening untrusted Office documents

🧯 If You Can't Patch

  • Implement strict email filtering to block suspicious Office attachments
  • Isolate Open-Xchange AppSuite instances from critical systems using network segmentation

🔍 How to Verify

Check if Vulnerable:

Check Open-Xchange AppSuite version against vendor advisory

Check Version:

Check Open-Xchange admin interface or consult vendor documentation

Verify Fix Applied:

Verify version number matches patched version in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual document upload patterns
  • Multiple failed document processing attempts
  • Unexpected script execution in document context

Network Indicators:

  • Unusual outbound connections after document processing
  • Data exfiltration patterns from AppSuite servers

SIEM Query:

source="open-xchange" AND (event="document_upload" OR event="script_execution")

🔗 References

📤 Share & Export