The comment editing template (dzz/comment/template...
Moderate severity
Unreviewed
Published
Nov 18, 2025
to the GitHub Advisory Database
•
Updated Nov 19, 2025
Description
Published by the National Vulnerability Database
Nov 18, 2025
Published to the GitHub Advisory Database
Nov 18, 2025
Last updated
Nov 19, 2025
The comment editing template (dzz/comment/template/edit_form.htm) in DzzOffice 2.3.x lacks adequate security escaping for user-controllable data in multiple contexts, including HTML and JavaScript strings. This allows low-privilege attackers to construct comment content or request parameters and execute arbitrary JavaScript code when the victim opens the editing pop-up.
References