Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a DOM-based Cross-Site Scripting (XSS) vulnerability exists in the GroupOffice application, allowing attackers to execute arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability can be triggered by injecting a crafted payload into a parameter that is later processed unsafely in the DOM. Versions 6.8.119 and 25.0.20 contain a fix for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 30 May 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Intermesh
Intermesh group-office |
|
CPEs | cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:* | |
Vendors & Products |
Intermesh
Intermesh group-office |
|
Metrics |
cvssV3_1
|
Thu, 22 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 22 May 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a DOM-based Cross-Site Scripting (XSS) vulnerability exists in the GroupOffice application, allowing attackers to execute arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability can be triggered by injecting a crafted payload into a parameter that is later processed unsafely in the DOM. Versions 6.8.119 and 25.0.20 contain a fix for the issue. | |
Title | GroupOffice's DOM-Based XSS in all Date Input Fields Allows Arbitrary JavaScript Execution | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-22T17:29:57.631Z
Updated: 2025-05-22T17:52:08.245Z
Reserved: 2025-05-19T15:46:00.394Z
Link: CVE-2025-48368

Updated: 2025-05-22T17:41:40.928Z

Status : Analyzed
Published: 2025-05-22T18:15:43.630
Modified: 2025-05-30T01:17:44.430
Link: CVE-2025-48368

No data.