CVE-2025-68935

6.4 MEDIUM

📋 TL;DR

CVE-2025-68935 is a cross-site scripting (XSS) vulnerability in ONLYOFFICE Docs DocumentServer that allows attackers to inject malicious scripts via the Font field in Multilevel list settings. This affects users of ONLYOFFICE Docs DocumentServer who open malicious documents. The vulnerability could lead to session hijacking, data theft, or unauthorized actions.

💻 Affected Systems

Products:
  • ONLYOFFICE Docs DocumentServer
Versions: All versions before 9.2.1
Operating Systems: All platforms running ONLYOFFICE DocumentServer
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component that processes document formatting. Requires user interaction to open malicious document.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on client systems.

🟠

Likely Case

Session hijacking leading to unauthorized access to documents and user accounts within the ONLYOFFICE environment.

🟢

If Mitigated

Limited impact with proper content security policies, input validation, and user awareness about opening untrusted documents.

🌐 Internet-Facing: HIGH - Document servers exposed to internet can be targeted by any remote attacker sending malicious documents.
🏢 Internal Only: MEDIUM - Requires internal attacker or compromised internal user to distribute malicious documents.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires creating a malicious document with crafted font field and convincing victim to open it. No authentication bypass needed beyond document access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2.1

Vendor Advisory: https://github.com/ONLYOFFICE/DocumentServer/blob/master/CHANGELOG.md#921

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Stop ONLYOFFICE DocumentServer service. 3. Update to version 9.2.1 using package manager or manual installation. 4. Restart ONLYOFFICE DocumentServer service. 5. Verify version and functionality.

🔧 Temporary Workarounds

Content Security Policy Enhancement

all

Implement strict CSP headers to prevent script execution from untrusted sources

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server configuration

Input Validation Proxy

all

Deploy WAF or reverse proxy to sanitize font field inputs

Configure ModSecurity or similar WAF with XSS detection rules

🧯 If You Can't Patch

  • Restrict document uploads to trusted sources only
  • Implement user education about opening untrusted documents

🔍 How to Verify

Check if Vulnerable:

Check ONLYOFFICE DocumentServer version. If version is below 9.2.1, system is vulnerable.

Check Version:

Check web interface admin panel or run: docker exec onlyoffice-documentserver cat /etc/onlyoffice/documentserver/package.json | grep version

Verify Fix Applied:

After patching, verify version is 9.2.1 or higher and test document processing functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual font names in document processing logs
  • Multiple failed document processing attempts with special characters

Network Indicators:

  • Documents with suspicious font field content being uploaded
  • Unexpected script tags in document server responses

SIEM Query:

source="onlyoffice" AND (font:*script* OR font:*javascript* OR font:*onload* OR font:*onerror*)

🔗 References

📤 Share & Export