CVE-2025-68936

6.4 MEDIUM

📋 TL;DR

This vulnerability allows cross-site scripting (XSS) attacks through the Color theme name feature in ONLYOFFICE Docs. Attackers can inject malicious scripts that execute in users' browsers when they interact with affected documents. This affects organizations using ONLYOFFICE DocumentServer versions before 9.2.1.

💻 Affected Systems

Products:
  • ONLYOFFICE Docs
  • ONLYOFFICE DocumentServer
Versions: All versions before 9.2.1
Operating Systems: All platforms running ONLYOFFICE DocumentServer
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface of DocumentServer where users can set or view Color theme names.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized actions within the document collaboration environment.

🟢

If Mitigated

Limited impact with proper content security policies and input validation, though some data exposure may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity, but this requires user interaction with malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2.1

Vendor Advisory: https://github.com/ONLYOFFICE/DocumentServer/blob/master/CHANGELOG.md#921

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download ONLYOFFICE DocumentServer 9.2.1 or later. 3. Stop the DocumentServer service. 4. Install the updated version. 5. Restart the DocumentServer service. 6. Verify the update was successful.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution from untrusted sources

Add 'Content-Security-Policy' header to web server configuration

Disable Color Theme Customization

all

Restrict user ability to set custom Color theme names if not required

Modify DocumentServer configuration to disable theme name customization

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block XSS payloads
  • Educate users about not clicking suspicious links or opening untrusted documents

🔍 How to Verify

Check if Vulnerable:

Check DocumentServer version via web interface admin panel or system logs

Check Version:

Check ONLYOFFICE Docs version in web interface or run: docker exec onlyoffice-documentserver cat /etc/onlyoffice/documentserver/package.json | grep version

Verify Fix Applied:

Verify version is 9.2.1 or later and test XSS payloads are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual theme name entries containing script tags
  • Multiple failed theme name validation attempts

Network Indicators:

  • HTTP requests with suspicious theme name parameters containing script payloads

SIEM Query:

source="onlyoffice" AND (theme_name CONTAINS "<script>" OR theme_name CONTAINS "javascript:")

🔗 References

📤 Share & Export