📦 Group Office

by Group Office

🔍 What is Group Office?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2026-25512

HIGH CVSS 8.8 Feb 4, 2026

This CVE describes a remote code execution vulnerability in Group-Office where an authenticated attacker can execute arbitrary system commands on the server by injecting shell metacharacters into the ...

CVE-2026-25134

HIGH CVSS 8.8 Feb 2, 2026

This vulnerability allows remote code execution in Group-Office by exploiting improper input validation in the MaintenanceController's zipLanguage action. Attackers can inject malicious commands throu...

CVE-2025-63406

HIGH CVSS 8.8 Nov 13, 2025

This vulnerability allows remote attackers to execute arbitrary code on GroupOffice installations via improper input validation in the dbToApi() function and eval() usage in FunctionField.php. It affe...

CVE-2026-25511

MEDIUM CVSS 4.9 Feb 4, 2026

This vulnerability allows authenticated users in the System Administrator group of Group-Office to perform Server-Side Request Forgery (SSRF) attacks via the WOPI service discovery URL. Attackers can ...

CVE-2026-23887

MEDIUM CVSS 5.4 Jan 22, 2026

Group-Office versions 6.8.148 and below, and 25.0.1 through 25.0.79 have a stored XSS vulnerability where unsanitized filenames are stored in the database. When users view these malicious filenames in...

CVE-2025-53505

MEDIUM CVSS 5.3 Aug 21, 2025

Group-Office versions before 6.8.119 and 25.0.20 contain a path traversal vulnerability that allows attackers to access files outside the intended directory. This affects all servers running vulnerabl...

CVE-2025-53504

MEDIUM CVSS 5.4 Aug 21, 2025

Group-Office versions before 6.8.119 and 25.0.20 contain a cross-site scripting (XSS) vulnerability that allows attackers to execute arbitrary scripts in users' web browsers. This affects all users of...

CVE-2025-25191

MEDIUM CVSS 5.4 Mar 6, 2025

This stored cross-site scripting (XSS) vulnerability in Group-Office allows attackers to inject malicious scripts into the Name field, which are then executed when other users view the affected conten...