Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a stored and blind XSS vulnerability exists in the Phone Number field of the user profile within the GroupOffice application. This allows a malicious actor to inject persistent JavaScript payloads, which are triggered in the context of another user when they view the Address Book. Successful exploitation enables actions such as forced redirects, unauthorized fetch requests, or other arbitrary JavaScript execution without user interaction. Versions 6.8.119 and 25.0.20 contain a fix for the issue.
References
Link | Resource |
---|---|
https://github.com/Intermesh/groupoffice/security/advisories/GHSA-phhq-3h8f-qxpx | Vendor Advisory |
https://github.com/Intermesh/groupoffice/security/advisories/GHSA-phhq-3h8f-qxpx | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 May 2025, 01:17
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
First Time |
Intermesh group-office
Intermesh |
|
CPE | cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:* | |
References | () https://github.com/Intermesh/groupoffice/security/advisories/GHSA-phhq-3h8f-qxpx - Vendor Advisory |
23 May 2025, 15:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-22 18:15
Updated : 2025-05-30 01:17
NVD link : CVE-2025-48366
Mitre link : CVE-2025-48366
CVE.ORG link : CVE-2025-48366
JSON object : View
Products Affected
intermesh
- group-office